CVE-2003-0085 : Detail

CVE-2003-0085

86.07%V4
Network
2003-03-18
04h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16321

Publication date : 2010-04-27 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

Exploit Database EDB-ID : 9936

Publication date : 2003-04-06 22h00 +00:00
Author : H D Moore
EDB Verified : Yes

Exploit Database EDB-ID : 22356

Publication date : 2003-03-14 23h00 +00:00
Author : flatline
EDB Verified : Yes

Products Mentioned

Configuraton 0

Samba>>Samba >> Version 2.0.0

Samba>>Samba >> Version 2.0.1

Samba>>Samba >> Version 2.0.2

Samba>>Samba >> Version 2.0.3

Samba>>Samba >> Version 2.0.4

Samba>>Samba >> Version 2.0.5

Samba>>Samba >> Version 2.0.6

Samba>>Samba >> Version 2.0.7

Samba>>Samba >> Version 2.0.8

Samba>>Samba >> Version 2.0.9

Samba>>Samba >> Version 2.0.10

Samba>>Samba >> Version 2.2.0

Samba>>Samba >> Version 2.2.0a

Samba>>Samba >> Version 2.2.1a

Samba>>Samba >> Version 2.2.2

Samba>>Samba >> Version 2.2.3

Samba>>Samba >> Version 2.2.3a

Samba>>Samba >> Version 2.2.4

Samba>>Samba >> Version 2.2.5

Samba>>Samba >> Version 2.2.6

Samba>>Samba >> Version 2.2.7

Samba>>Samba >> Version 2.2.7a

Configuraton 0

Hp>>Cifs-9000_server >> Version a.01.05

Hp>>Cifs-9000_server >> Version a.01.06

Hp>>Cifs-9000_server >> Version a.01.07

Hp>>Cifs-9000_server >> Version a.01.08

Hp>>Cifs-9000_server >> Version a.01.08.01

Hp>>Cifs-9000_server >> Version a.01.09

Hp>>Cifs-9000_server >> Version a.01.09.01

References

http://marc.info/?l=bugtraq&m=104792723017768&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=104792646416629&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.redhat.com/support/errata/RHSA-2003-096.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=104801012929374&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/7106
Tags : vdb-entry, x_refsource_BID
http://www.redhat.com/support/errata/RHSA-2003-095.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.kb.cert.org/vuls/id/298233
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.mandriva.com/security/advisories?name=MDKSA-2003:032
Tags : vendor-advisory, x_refsource_MANDRAKE
http://www.securityfocus.com/archive/1/317145/30/25220/threaded
Tags : vendor-advisory, x_refsource_IMMUNIX
http://www.debian.org/security/2003/dsa-262
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/8303
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/8299
Tags : third-party-advisory, x_refsource_SECUNIA