Vulnerability Name:

CVE-2003-0605 (CCN-12679)

Assigned:2003-07-20
Published:2003-07-20
Updated:2019-04-30
Summary:The RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Sun Jul 20 2003 - 14:01:13 CDT
Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability

Source: MITRE
Type: CNA
CVE-2003-0605

Source: FULLDISC
Type: UNKNOWN
20030721 Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20030720 Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability

Source: CCN
Type: CERT Advisory CA-2003-19
Exploitation of Vulnerabilities in Microsoft RPC Interface

Source: CERT
Type: US Government Resource
CA-2003-19

Source: CERT
Type: US Government Resource
CA-2003-23

Source: CCN
Type: US-CERT VU#326746
Microsoft Windows RPC service vulnerable to denial of service

Source: CERT-VN
Type: US Government Resource
VU#326746

Source: CCN
Type: Microsoft Security Bulletin MS03-039
Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)

Source: CCN
Type: Microsoft Security Bulletin MS04-029
Vulnerability in RPC Runtime Library Could Allow Information Disclosure and Denial of Service (873350)

Source: CCN
Type: Microsoft Security Bulletin MS05-012
Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)

Source: CCN
Type: Microsoft Security Bulletin MS05-051
Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)

Source: CCN
Type: Microsoft Security Bulletin MS06-018
Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580)

Source: CCN
Type: BID-8234
Microsoft Windows RPCSS DCOM Interface Denial of Service Vulnerability

Source: MS
Type: UNKNOWN
MS03-039

Source: XF
Type: UNKNOWN
win-rpc-dcom-dos(12679)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1118

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:494

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_nt:4.0::terminal_server:*:*:*:*:*
  • OR cpe:/o:hp:openvms_alpha:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0::server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0::workstation:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:openvms_alpha:7.3-1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:openvms_alpha:7.3-2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:r2:-:*:*:enterprise:*:x86:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:494
    V
    MS Windows RPC DCOM DoS-based Privilege Escalation Vulnerability
    2011-05-16
    oval:org.mitre.oval:def:1118
    V
    MS Windows RPC DCOM DoS-based Privilege Escalation Vulnerability (Test 2)
    2011-05-16
    BACK
    microsoft windows 2000 *
    microsoft windows 2000 * sp1
    microsoft windows 2000 * sp2
    microsoft windows 2000 * sp3
    microsoft windows 2000 * sp4
    microsoft windows 2000 *
    microsoft windows nt 4.0
    hp openvms alpha 7.3
    microsoft windows xp - sp1
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows xp -
    microsoft windows 2003 server *
    hp openvms alpha 7.3-1
    hp openvms alpha 7.3-2
    microsoft windows 2003 server - r2