Vulnerability Details : CVE-2004-0193
Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
Vulnerability category: OverflowExecute code
Products affected by CVE-2004-0193
- cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu20.16:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_network:7.0:xpu_20.15:*:*:*:*:*:*
- cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
- cpe:2.3:h:iss:proventia_m_series_xpu:1.30:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0193
32.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0193
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-0193
-
http://www.eeye.com/html/Research/Upcoming/20040213.html
Identity and Access Security | BeyondTrustVendor Advisory
-
http://secunia.com/advisories/10988
-
http://xforce.iss.net/xforce/alerts/id/165
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/150326
VU#150326 - Internet Security Systems' BlackICE and RealSecure contain a heap overflow in the processing of SMB packetsPatch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/9752
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15207
PAM component buffer overflow when parsing SMB protocol CVE-2004-0193 Vulnerability Report
-
http://www.osvdb.org/4072
-
http://www.eeye.com/html/Research/Advisories/AD20040226.html
-
http://marc.info/?l=bugtraq&m=107789851117176&w=2
'EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow' - MARC
Jump to