Vulnerability Name:

CVE-2002-0724 (CCN-9933)

Assigned:2002-08-22
Published:2002-08-22
Updated:2019-04-30
Summary:Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Internet Security Systems Security Alert, August 29, 2002
Microsoft Windows SMB Denial of Service Vulnerability

Source: MITRE
Type: CNA
CVE-2002-0724

Source: BUGTRAQ
Type: UNKNOWN
20020822 CORE-20020618: Vulnerabilities in Windows SMB (DoS)

Source: CCN
Type: Cisco Systems Inc. Security Advisory, 2002 September 18 16:00 (UTC -0400)
Microsoft Windows SMB Denial of Service Vulnerabilities in Cisco Products - MS02-045

Source: CCN
Type: Core Security Technologies Advisory CORE-20020618
Denial of Service Vulnerabilities in Windows SMB implementation

Source: CCN
Type: US-CERT VU#250635
Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum2 transaction

Source: CERT-VN
Type: Patch, Third Party Advisory, US Government Resource
VU#250635

Source: CCN
Type: US-CERT VU#311619
Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum3 transaction

Source: CERT-VN
Type: US Government Resource
VU#311619

Source: CCN
Type: US-CERT VU#342243
Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetShareEnum transaction

Source: CERT-VN
Type: US Government Resource
VU#342243

Source: CCN
Type: Microsoft Security Bulletin MS02-045
Unchecked Buffer in Network Share Provider Can Lead to Denial of Service (Q326830)

Source: CCN
Type: OSVDB ID: 2074
Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS

Source: CCN
Type: BID-5556
Microsoft Network Share Provider SMB Request Buffer Overflow Vulnerability

Source: MS
Type: UNKNOWN
MS02-045

Source: XF
Type: UNKNOWN
win-smb-packet-bo(9933)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:189

Source: CCN
Type: Microsoft Knowledge Base Article 326830
MS02-045: Unchecked Buffer in Network Share Provider May Lead to Denial-of-Service

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:x86:*
  • OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:x86:*
  • OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:gold:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:professional:*:*:*
  • OR cpe:/h:cisco:unity_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:cns_network_registrar:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:intelligent_contact_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:e-mail_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:collaboration_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:user_registration_tool:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:server:*:*:*
  • OR cpe:/a:cisco:acs_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_2000_service_management_solution:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:building_broadband_service_manager:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:189
    V
    Network Share Provider Buffer Overflow
    2011-05-16
    BACK
    microsoft windows 2000 *
    microsoft windows 2000 * sp1
    microsoft windows 2000 * sp2
    microsoft windows 2000 * sp3
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows nt 4.0 sp1
    microsoft windows nt 4.0 sp1
    microsoft windows nt 4.0 sp1
    microsoft windows nt 4.0 sp2
    microsoft windows nt 4.0 sp2
    microsoft windows nt 4.0 sp2
    microsoft windows nt 4.0 sp3
    microsoft windows nt 4.0 sp3
    microsoft windows nt 4.0 sp3
    microsoft windows nt 4.0 sp4
    microsoft windows nt 4.0 sp4
    microsoft windows nt 4.0 sp4
    microsoft windows nt 4.0 sp5
    microsoft windows nt 4.0 sp5
    microsoft windows nt 4.0 sp5
    microsoft windows nt 4.0 sp6
    microsoft windows nt 4.0 sp6
    microsoft windows nt 4.0 sp6
    microsoft windows nt 4.0 sp6a
    microsoft windows nt 4.0 sp6a
    microsoft windows nt 4.0 sp6a
    microsoft windows xp *
    microsoft windows xp * gold
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows 2000 *
    microsoft windows 2000 *
    microsoft windows xp *
    microsoft windows 2000 *
    cisco unity server -
    cisco cns network registrar *
    cisco intelligent contact manager *
    cisco e-mail manager *
    cisco collaboration server 5.0
    cisco user registration tool *
    microsoft windows 2003_server
    microsoft windows 2000 *
    cisco acs solution engine *
    cisco ciscoworks 2000 service management solution *
    cisco building broadband service manager -