MS03-039: Microsoft RPC Interface Buffer Overrun (824146) (uncredentialed check)

critical Nessus Plugin ID 11835

Synopsis

Arbitrary code can be executed on the remote host.

Description

The remote host is running a version of Windows that has a flaw in its RPC interface, which may allow an attacker to execute arbitrary code and gain SYSTEM privileges.

An attacker or a worm could use it to gain the control of this host.

Note that this is NOT the same bug as the one described in MS03-026, which fixes the flaw exploited by the 'MSBlast' (or LoveSan) worm.

Solution

Microsoft has released patches for Windows NT, 2000, XP, and 2003.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2003/ms03-039

Plugin Details

Severity: Critical

ID: 11835

File Name: msrpc_dcom2.nasl

Version: 1.71

Type: local

Agent: windows

Family: Windows

Published: 9/10/2003

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2003

Vulnerability Publication Date: 7/20/2003

Reference Information

CVE: CVE-2003-0528, CVE-2003-0605, CVE-2003-0715

BID: 8458, 8460

MSFT: MS03-039

MSKB: 824146