CVE-2004-0193

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*
cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_network:7.0:xpu_20.15:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu20.16:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
cpe:2.3:h:iss:proventia_m_series_xpu:1.30:*:*:*:*:*:*:*

History

20 Nov 2024, 23:47

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=107789851117176&w=2 - () http://marc.info/?l=bugtraq&m=107789851117176&w=2 -
References () http://secunia.com/advisories/10988 - () http://secunia.com/advisories/10988 -
References () http://www.eeye.com/html/Research/Advisories/AD20040226.html - () http://www.eeye.com/html/Research/Advisories/AD20040226.html -
References () http://www.eeye.com/html/Research/Upcoming/20040213.html - Vendor Advisory () http://www.eeye.com/html/Research/Upcoming/20040213.html - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/150326 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/150326 - Patch, Third Party Advisory, US Government Resource
References () http://www.osvdb.org/4072 - () http://www.osvdb.org/4072 -
References () http://www.securityfocus.com/bid/9752 - () http://www.securityfocus.com/bid/9752 -
References () http://xforce.iss.net/xforce/alerts/id/165 - Patch, Vendor Advisory () http://xforce.iss.net/xforce/alerts/id/165 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15207 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15207 -

Information

Published : 2004-03-15 05:00

Updated : 2024-11-20 23:47


NVD link : CVE-2004-0193

Mitre link : CVE-2004-0193

CVE.ORG link : CVE-2004-0193


JSON object : View

Products Affected

iss

  • realsecure_server_sensor
  • proventia_m_series_xpu
  • realsecure_sentry
  • realsecure_guard
  • blackice_agent_server
  • realsecure_network
  • proventia_g_series_xpu
  • blackice_server_protection
  • proventia_a_series_xpu
  • blackice_pc_protection
  • realsecure_desktop