Vulnerability Name: CVE-2003-0003 (CCN-11132) Assigned: 2003-01-22 Published: 2003-01-22 Updated: 2019-04-30 Summary: Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Sat Feb 01 2003 - 12:17:37 CSTlocator exploit Source: CCN Type: Core Security Technologies Advisory CORE-2003-12-05DCE RPC Vulnerabilities New Attack Vectors Analysis Source: MITRE Type: CNACVE-2003-0003 Source: BUGTRAQ Type: Third Party Advisory20030130 Microsoft RPC Locator Buffer Overflow Vulnerability (#NISR29012003) Source: NTBUGTRAQ Type: Third Party Advisory20030130 Microsoft RPC Locator Buffer Overflow Vulnerability (#NISR29012003) Source: CCN Type: CERT Advisory CA-2003-03Buffer Overflow in Windows Locator Service Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2003-03 Source: CCN Type: CIAC Information Bulletin N-033Microsoft Unchecked Buffer in Locator Service Vulnerability Source: CCN Type: US-CERT VU#610986Microsoft Locator service contains buffer overflow Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#610986 Source: CCN Type: Microsoft Security Bulletin MS03-001Unchecked Buffer in Locator Service Could Lead to Code Execution (810833) Source: CCN Type: NGSSoftware Insight Security Research Advisory #NISR29012003Locator Service Buffer Overflow Vulnerability Source: BID Type: Third Party Advisory, VDB Entry6666 Source: CCN Type: BID-6666Microsoft Windows Locator Service Buffer Overflow Vulnerability Source: MS Type: UNKNOWNMS03-001 Source: XF Type: Third Party Advisory, VDB Entrywin-locator-bo(11132) Source: XF Type: UNKNOWNwin-locator-bo(11132) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:103 Vulnerable Configuration: Configuration 1 :cpe:/a:microsoft:windows_2000_terminal_services:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:* OR cpe:/a:microsoft:windows_2000_terminal_services:-:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:x86:* OR cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:workstation:*:x86:* OR cpe:/o:microsoft:windows_xp:*:*:home:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:gold:professional:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp1:home:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:*:64-bit:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:sp1:64-bit:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:4.0::terminal_server:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:*:x64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 terminal services -
microsoft windows 2000 *
microsoft windows 2000 * sp1
microsoft windows 2000 * sp2
microsoft windows 2000 * sp3
microsoft windows 2000 terminal services * sp1
microsoft windows 2000 terminal services * sp2
microsoft windows 2000 terminal services - sp3
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp1
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp2
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp3
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp4
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp5
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6
microsoft windows nt 4.0 sp6a
microsoft windows nt 4.0 sp6a
microsoft windows nt 4.0 sp6a
microsoft windows nt 4.0 sp6a
microsoft windows xp *
microsoft windows xp * gold
microsoft windows xp * sp1
microsoft windows xp -
microsoft windows xp - sp1
microsoft windows nt 4.0
microsoft windows nt 4.0
microsoft windows 2000 *
microsoft windows xp
microsoft windows xp -