Vulnerability Details : CVE-2003-0813
A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.
Vulnerability category: Denial of service
Products affected by CVE-2003-0813
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x86:*
- cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x64:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0813
67.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0813
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2003-0813
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2003-0813
-
http://www.kb.cert.org/vuls/id/547820
VU#547820 - Microsoft Windows DCOM/RPC vulnerabilityPatch;Third Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=106588827513795&w=2
'RE: Bad news on RPC DCOM vulnerability' - MARCThird Party Advisory
-
http://marc.info/?l=bugtraq&m=106579825211708&w=2
'Bad news on RPC DCOM vulnerability' - MARCThird Party Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html
[Full-Disclosure] Mailing List CharterURL Repurposed
-
http://www.us-cert.gov/cas/techalerts/TA04-104A.html
Page Not Found | CISABroken Link;Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900
404 Not FoundBroken Link
-
http://www.securitylab.ru/_exploits/rpc2.c.txt
Broken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A894
404 Not FoundBroken Link
-
http://marc.info/?l=ntbugtraq&m=106580303918155&w=2
'Bad news on RPC DCOM vulnerability' - MARCThird Party Advisory
-
http://xforce.iss.net/xforce/alerts/id/155
Broken Link;Patch;Vendor Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html
[Full-Disclosure] Mailing List CharterURL Repurposed
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A893
404 Not FoundBroken Link
-
http://www.securityfocus.com/bid/8811
Broken Link;Third Party Advisory;VDB Entry
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html
[Full-Disclosure] Mailing List CharterURL Repurposed
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012
Microsoft Security Bulletin MS04-012 - Critical | Microsoft LearnPatch;Vendor Advisory
Jump to