CVE-2003-0109

Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
References
Link Resource
http://marc.info/?l=bugtraq&m=104826476427372&w=2
http://marc.info/?l=bugtraq&m=104861839130254&w=2
http://marc.info/?l=bugtraq&m=104869293619064&w=2
http://marc.info/?l=bugtraq&m=104887148323552&w=2
http://marc.info/?l=bugtraq&m=105768156625699&w=2
http://marc.info/?l=ntbugtraq&m=104826785731151&w=2
http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en
http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ815021
http://www.cert.org/advisories/CA-2003-09.html Patch Third Party Advisory US Government Resource
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029 Patch Vendor Advisory
http://www.iss.net/security_center/static/11533.php Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/117394 US Government Resource
http://www.nextgenss.com/papers/ms03-007-ntdll.pdf
http://www.securityfocus.com/bid/7116 Exploit Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-007
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A109
http://marc.info/?l=bugtraq&m=104826476427372&w=2
http://marc.info/?l=bugtraq&m=104861839130254&w=2
http://marc.info/?l=bugtraq&m=104869293619064&w=2
http://marc.info/?l=bugtraq&m=104887148323552&w=2
http://marc.info/?l=bugtraq&m=105768156625699&w=2
http://marc.info/?l=ntbugtraq&m=104826785731151&w=2
http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en
http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ815021
http://www.cert.org/advisories/CA-2003-09.html Patch Third Party Advisory US Government Resource
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029 Patch Vendor Advisory
http://www.iss.net/security_center/static/11533.php Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/117394 US Government Resource
http://www.nextgenss.com/papers/ms03-007-ntdll.pdf
http://www.securityfocus.com/bid/7116 Exploit Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-007
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A109
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*

History

20 Nov 2024, 23:43

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=104826476427372&w=2 - () http://marc.info/?l=bugtraq&m=104826476427372&w=2 -
References () http://marc.info/?l=bugtraq&m=104861839130254&w=2 - () http://marc.info/?l=bugtraq&m=104861839130254&w=2 -
References () http://marc.info/?l=bugtraq&m=104869293619064&w=2 - () http://marc.info/?l=bugtraq&m=104869293619064&w=2 -
References () http://marc.info/?l=bugtraq&m=104887148323552&w=2 - () http://marc.info/?l=bugtraq&m=104887148323552&w=2 -
References () http://marc.info/?l=bugtraq&m=105768156625699&w=2 - () http://marc.info/?l=bugtraq&m=105768156625699&w=2 -
References () http://marc.info/?l=ntbugtraq&m=104826785731151&w=2 - () http://marc.info/?l=ntbugtraq&m=104826785731151&w=2 -
References () http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en - () http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en -
References () http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ815021 - () http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ815021 -
References () http://www.cert.org/advisories/CA-2003-09.html - Patch, Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2003-09.html - Patch, Third Party Advisory, US Government Resource
References () http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029 - Patch, Vendor Advisory () http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029 - Patch, Vendor Advisory
References () http://www.iss.net/security_center/static/11533.php - Patch, Vendor Advisory () http://www.iss.net/security_center/static/11533.php - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/117394 - US Government Resource () http://www.kb.cert.org/vuls/id/117394 - US Government Resource
References () http://www.nextgenss.com/papers/ms03-007-ntdll.pdf - () http://www.nextgenss.com/papers/ms03-007-ntdll.pdf -
References () http://www.securityfocus.com/bid/7116 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/7116 - Exploit, Patch, Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-007 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-007 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A109 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A109 -

07 Nov 2023, 01:56

Type Values Removed Values Added
References
  • {'url': 'http://support.microsoft.com/default.aspx?scid=kb;[LN];Q815021', 'name': 'Q815021', 'tags': [], 'refsource': 'MSKB'}
  • () http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ815021 -

Information

Published : 2003-03-31 05:00

Updated : 2024-11-20 23:43


NVD link : CVE-2003-0109

Mitre link : CVE-2003-0109

CVE.ORG link : CVE-2003-0109


JSON object : View

Products Affected

microsoft

  • windows_2000_terminal_services
  • windows_2000