MS03-039: Microsoft RPC Interface Buffer Overrun (824146) (uncredentialed check)

Critical Nessus Plugin ID 11835


Arbitrary code can be executed on the remote host.


The remote host is running a version of Windows that has a flaw in its RPC interface, which may allow an attacker to execute arbitrary code and gain SYSTEM privileges.

An attacker or a worm could use it to gain the control of this host.

Note that this is NOT the same bug as the one described in MS03-026, which fixes the flaw exploited by the 'MSBlast' (or LoveSan) worm.


Microsoft has released patches for Windows NT, 2000, XP, and 2003.

See Also

Plugin Details

Severity: Critical

ID: 11835

File Name: msrpc_dcom2.nasl

Version: $Revision: 1.69 $

Type: local

Agent: windows

Family: Windows

Published: 2003/09/10

Modified: 2017/08/30

Dependencies: 10785

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2003/09/10

Vulnerability Publication Date: 2003/07/20

Reference Information

CVE: CVE-2003-0715, CVE-2003-0528, CVE-2003-0605

BID: 8458, 8460

OSVDB: 11460, 11797, 2535

MSFT: MS03-039

MSKB: 824146