Vulnerability Name:

CVE-2003-0033 (CCN-10956)

Assigned:2003-03-03
Published:2003-03-03
Updated:2016-10-18
Summary:Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Mon Mar 03 2003 - 17:23:22 CST
[Snort-2003-001] Buffer overflow in Snort RPC preprocessor (fwd)

Source: MITRE
Type: CNA
CVE-2003-0033

Source: BUGTRAQ
Type: UNKNOWN
20030303 Snort RPC Vulnerability (fwd)

Source: GENTOO
Type: UNKNOWN
GLSA-200303-6.1

Source: GENTOO
Type: UNKNOWN
GLSA-200304-06

Source: CCN
Type: CERT Advisory CA-2003-13
Multiple Vulnerabilities in Snort Preprocessors

Source: CERT
Type: US Government Resource
CA-2003-13

Source: CCN
Type: CIAC Information Bulletin N-049
Snort RPC Preprocessing Vulnerability

Source: DEBIAN
Type: UNKNOWN
DSA-297

Source: DEBIAN
Type: DSA 297-1
snort -- integer overflow, buffer overflow

Source: DEBIAN
Type: DSA-297
snort -- integer overflow

Source: ISS
Type: Patch, Vendor Advisory
20030303 Snort RPC Preprocessing Vulnerability

Source: XF
Type: Patch, Vendor Advisory
snort-rpc-fragment-bo(10956)

Source: CCN
Type: US-CERT VU#916785
Buffer overflow in Snort RPC preprocessor

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#916785

Source: ENGARDE
Type: UNKNOWN
ESA-20030307-007

Source: CCN
Type: Gentoo Linux Security Announcement 200303-6.1
snort -- buffer overflow

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20030307-007
snort -- RPC preprocessor buffer overflow.

Source: CCN
Type: Gentoo Linux Security Announcement 200304-05
snort -- Multiple Vulnerabilities in Snort Preprocessors

Source: CCN
Type: Gentoo Linux Security Announcement 200304-06
snort Multiple Vulnerabilities in Snort Preprocessors

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:029

Source: OSVDB
Type: UNKNOWN
4418

Source: CCN
Type: OSVDB ID: 4418
Snort RPC Decode Module Overflow

Source: BID
Type: Patch, Vendor Advisory
6963

Source: CCN
Type: BID-6963
Snort RPC Preprocessor Fragment Reassembly Buffer Overflow Vulnerability

Source: CCN
Type: SmoothWall.org Web site
Get SmoothWall

Source: CCN
Type: Snort.org Web site
Snort.org

Source: XF
Type: UNKNOWN
snort-rpc-fragment-bo(10956)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:snort:snort:1.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.9.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:snort:snort:1.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:snort:snort:1.9.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030033
    V
    CVE-2003-0033
    2015-11-16
    oval:org.debian:def:297
    V
    integer overflow, buffer overflow
    2003-05-01
    BACK
    snort snort 1.8.0
    snort snort 1.8.1
    snort snort 1.8.2
    snort snort 1.8.3
    snort snort 1.8.4
    snort snort 1.8.5
    snort snort 1.8.6
    snort snort 1.8.7
    snort snort 1.9.0
    snort snort 1.8.3
    snort snort 1.8.0
    snort snort 1.8.1
    snort snort 1.8.2
    snort snort 1.8.4
    snort snort 1.8.5
    snort snort 1.8.6
    snort snort 1.8.7
    snort snort 1.9.0
    engardelinux secure linux -
    mandrakesoft mandrake linux 8.2
    debian debian linux 3.0
    engardelinux secure professional -
    gentoo linux *
    mandrakesoft mandrake linux 9.0
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 8.2