Vulnerability Name: CVE-2002-0724 (CCN-9933) Assigned: 2002-08-22 Published: 2002-08-22 Updated: 2019-04-30 Summary: Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service". CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: Internet Security Systems Security Alert, August 29, 2002Microsoft Windows SMB Denial of Service Vulnerability Source: MITRE Type: CNACVE-2002-0724 Source: BUGTRAQ Type: UNKNOWN20020822 CORE-20020618: Vulnerabilities in Windows SMB (DoS) Source: CCN Type: Cisco Systems Inc. Security Advisory, 2002 September 18 16:00 (UTC -0400)Microsoft Windows SMB Denial of Service Vulnerabilities in Cisco Products - MS02-045 Source: CCN Type: Core Security Technologies Advisory CORE-20020618Denial of Service Vulnerabilities in Windows SMB implementation Source: CCN Type: US-CERT VU#250635Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum2 transaction Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#250635 Source: CCN Type: US-CERT VU#311619Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum3 transaction Source: CERT-VN Type: US Government ResourceVU#311619 Source: CCN Type: US-CERT VU#342243Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetShareEnum transaction Source: CERT-VN Type: US Government ResourceVU#342243 Source: CCN Type: Microsoft Security Bulletin MS02-045Unchecked Buffer in Network Share Provider Can Lead to Denial of Service (Q326830) Source: CCN Type: OSVDB ID: 2074Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS Source: CCN Type: BID-5556Microsoft Network Share Provider SMB Request Buffer Overflow Vulnerability Source: MS Type: UNKNOWNMS02-045 Source: XF Type: UNKNOWNwin-smb-packet-bo(9933) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:189 Source: CCN Type: Microsoft Knowledge Base Article 326830MS02-045: Unchecked Buffer in Network Share Provider May Lead to Denial-of-Service Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:gold:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:* OR cpe:/o:microsoft:windows_xp:*:*:professional:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:professional:*:*:* OR cpe:/h:cisco:unity_server:-:*:*:*:*:*:*:* OR cpe:/a:cisco:cns_network_registrar:*:*:*:*:*:*:*:* OR cpe:/a:cisco:intelligent_contact_manager:*:*:*:*:*:*:*:* OR cpe:/a:cisco:e-mail_manager:*:*:*:*:*:*:*:* OR cpe:/a:cisco:collaboration_server:5.0:*:*:*:*:*:*:* OR cpe:/a:cisco:user_registration_tool:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:server:*:*:* OR cpe:/a:cisco:acs_solution_engine:*:*:*:*:*:*:*:* OR cpe:/a:cisco:ciscoworks_2000_service_management_solution:*:*:*:*:*:*:*:* OR cpe:/h:cisco:building_broadband_service_manager:-:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 *
microsoft windows 2000 * sp1
microsoft windows 2000 * sp2
microsoft windows 2000 * sp3
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6a
microsoft windows nt 4.0 sp6a
microsoft windows nt 4.0 sp6a
microsoft windows xp *
microsoft windows xp * gold
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows 2000 *
microsoft windows 2000 *
microsoft windows xp *
microsoft windows 2000 *
cisco unity server -
cisco cns network registrar *
cisco intelligent contact manager *
cisco e-mail manager *
cisco collaboration server 5.0
cisco user registration tool *
microsoft windows 2003_server
microsoft windows 2000 *
cisco acs solution engine *
cisco ciscoworks 2000 service management solution *
cisco building broadband service manager -