CVE-2003-0196 : Detail

CVE-2003-0196

3.09%V3
Network
2003-04-15
02h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Samba>>Samba >> Version 2.0.0

Samba>>Samba >> Version 2.0.1

Samba>>Samba >> Version 2.0.2

Samba>>Samba >> Version 2.0.3

Samba>>Samba >> Version 2.0.4

Samba>>Samba >> Version 2.0.5

Samba>>Samba >> Version 2.0.6

Samba>>Samba >> Version 2.0.7

Samba>>Samba >> Version 2.0.8

Samba>>Samba >> Version 2.0.9

Samba>>Samba >> Version 2.0.10

Samba>>Samba >> Version 2.2.0

Samba>>Samba >> Version 2.2.0a

Samba>>Samba >> Version 2.2.1a

Samba>>Samba >> Version 2.2.2

Samba>>Samba >> Version 2.2.3

Samba>>Samba >> Version 2.2.3a

Samba>>Samba >> Version 2.2.4

Samba>>Samba >> Version 2.2.5

Samba>>Samba >> Version 2.2.6

Samba>>Samba >> Version 2.2.7

Samba>>Samba >> Version 2.2.7a

Samba>>Samba >> Version 2.2.8

Samba-tng>>Samba-tng >> Version 0.3

Samba-tng>>Samba-tng >> Version 0.3.1

Configuraton 0

Compaq>>Tru64 >> Version 4.0b

Compaq>>Tru64 >> Version 4.0d

Compaq>>Tru64 >> Version 4.0d_pk9_bl17

Compaq>>Tru64 >> Version 4.0f

Compaq>>Tru64 >> Version 4.0f_pk6_bl17

Compaq>>Tru64 >> Version 4.0f_pk7_bl18

Compaq>>Tru64 >> Version 4.0g

Compaq>>Tru64 >> Version 4.0g_pk3_bl17

Compaq>>Tru64 >> Version 5.0

Compaq>>Tru64 >> Version 5.0_pk4_bl17

Compaq>>Tru64 >> Version 5.0_pk4_bl18

Compaq>>Tru64 >> Version 5.0a

Compaq>>Tru64 >> Version 5.0a_pk3_bl17

Compaq>>Tru64 >> Version 5.0f

Compaq>>Tru64 >> Version 5.1

Compaq>>Tru64 >> Version 5.1_pk3_bl17

Compaq>>Tru64 >> Version 5.1_pk4_bl18

Compaq>>Tru64 >> Version 5.1_pk5_bl19

Compaq>>Tru64 >> Version 5.1_pk6_bl20

Compaq>>Tru64 >> Version 5.1a

Compaq>>Tru64 >> Version 5.1a_pk1_bl1

Compaq>>Tru64 >> Version 5.1a_pk2_bl2

Compaq>>Tru64 >> Version 5.1a_pk3_bl3

Compaq>>Tru64 >> Version 5.1b

Compaq>>Tru64 >> Version 5.1b_pk1_bl1

Hp>>Hp-ux >> Version 10.01

Hp>>Hp-ux >> Version 10.20

Hp>>Hp-ux >> Version 10.24

Hp>>Hp-ux >> Version 11.00

Hp>>Hp-ux >> Version 11.04

Hp>>Hp-ux >> Version 11.11

Hp>>Hp-ux >> Version 11.20

Hp>>Hp-ux >> Version 11.22

Sun>>Solaris >> Version 2.5.1

    Sun>>Solaris >> Version 2.5.1

      Sun>>Solaris >> Version 2.6

      Sun>>Solaris >> Version 7.0

        Sun>>Solaris >> Version 8.0

          Sun>>Solaris >> Version 9.0

            Sun>>Solaris >> Version 9.0

              Sun>>Sunos >> Version -

              Sun>>Sunos >> Version 5.5.1

              Sun>>Sunos >> Version 5.7

              Sun>>Sunos >> Version 5.8

              Configuraton 0

              Hp>>Cifs-9000_server >> Version a.01.05

              Hp>>Cifs-9000_server >> Version a.01.06

              Hp>>Cifs-9000_server >> Version a.01.07

              Hp>>Cifs-9000_server >> Version a.01.08

              Hp>>Cifs-9000_server >> Version a.01.08.01

              Hp>>Cifs-9000_server >> Version a.01.09

              Hp>>Cifs-9000_server >> Version a.01.09.01

              Hp>>Cifs-9000_server >> Version a.01.09.02

              References

              http://www.debian.org/security/2003/dsa-280
              Tags : vendor-advisory, x_refsource_DEBIAN
              http://www.mandriva.com/security/advisories?name=MDKSA-2003:044
              Tags : vendor-advisory, x_refsource_MANDRAKE
              http://www.redhat.com/support/errata/RHSA-2003-137.html
              Tags : vendor-advisory, x_refsource_REDHAT
              http://marc.info/?l=bugtraq&m=104973186901597&w=2
              Tags : mailing-list, x_refsource_BUGTRAQ
              http://marc.info/?l=bugtraq&m=104974612519064&w=2
              Tags : mailing-list, x_refsource_BUGTRAQ