CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2004-0193

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
Publish Date : 2004-03-15 Last Update Date : 2008-09-05
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.5
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access User
Vulnerability Type(s) Execute CodeOverflow
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2004-0193

# Product Type Vendor Product Version Update Edition Language
1 Application ISS Blackice Agent Server 3.6eca Version Details Vulnerabilities
2 Application ISS Blackice Pc Protection 3.6cbd Version Details Vulnerabilities
3 Application ISS Blackice Server Protection 3.6cbz Version Details Vulnerabilities
4 Hardware ISS Proventia A Series Xpu 20.15 Version Details Vulnerabilities
5 Hardware ISS Proventia G Series Xpu 22.3 Version Details Vulnerabilities
6 Hardware ISS Proventia M Series Xpu 1.30 Version Details Vulnerabilities
7 Application ISS Realsecure Desktop 3.6eca Version Details Vulnerabilities
8 Application ISS Realsecure Desktop 3.6ecf Version Details Vulnerabilities
9 Application ISS Realsecure Desktop 7.0epk Version Details Vulnerabilities
10 Application ISS Realsecure Desktop 7.0ebg Version Details Vulnerabilities
11 Application ISS Realsecure Guard 3.6ecb Version Details Vulnerabilities
12 Application ISS Realsecure Network 7.0 Xpu 20.15 Version Details Vulnerabilities
13 Application ISS Realsecure Sentry 3.6ecf Version Details Vulnerabilities
14 Application ISS Realsecure Server Sensor 7.0 Xpu20.16 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
ISS Blackice Agent Server 1
ISS Blackice Pc Protection 1
ISS Blackice Server Protection 1
ISS Proventia A Series Xpu 1
ISS Proventia G Series Xpu 1
ISS Proventia M Series Xpu 1
ISS Realsecure Desktop 4
ISS Realsecure Guard 1
ISS Realsecure Network 1
ISS Realsecure Sentry 1
ISS Realsecure Server Sensor 1

- References For CVE-2004-0193

http://secunia.com/advisories/10988
SECUNIA 10988
http://www.osvdb.org/4072
OSVDB 4072
http://www.eeye.com/html/Research/Advisories/AD20040226.html
EEYE AD20040226
http://www.securityfocus.com/bid/9752
BID 9752 Internet Security Systems Protocol Analysis Module SMB Parsing Heap Overflow Vulnerability Release Date:2004-02-26
http://xforce.iss.net/xforce/xfdb/15207
XF pam-smb-protocol-bo(15207)
http://www.eeye.com/html/Research/Upcoming/20040213.html
http://www.kb.cert.org/vuls/id/150326
CERT-VN VU#150326
http://xforce.iss.net/xforce/alerts/id/165
ISS 20040226 Vulnerability in SMB Parsing in ISS Products
http://marc.theaimsgroup.com/?l=bugtraq&m=107789851117176&w=2
BUGTRAQ 20040227 EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow

- Metasploit Modules Related To CVE-2004-0193

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.