
CVE-2003-0528
https://notcve.org/view.php?id=CVE-2003-0528
12 Sep 2003 — Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715. Desbordamiento de búfer en el interfaz DCOM (Distributed Component Object Model) en el servicio RPCSS permite a atacantes remotos la ejecución arbitraria de código mediante una petición RPC mal construida con un par... • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0100.html •

CVE-2003-0715
https://notcve.org/view.php?id=CVE-2003-0715
12 Sep 2003 — Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528. Desbordamiento de búfer basado en el montón en el interfaz DCOM (Distributed Component Object Model) del servicio RPCSS de Windows NT/2000/XP/2003 permite a atacantes remotos ejecutar c... • http://marc.info/?l=bugtraq&m=106322856608909&w=2 •

CVE-2003-0661
https://notcve.org/view.php?id=CVE-2003-0661
04 Sep 2003 — The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. • http://www.kb.cert.org/vuls/id/989932 •

CVE-2003-0525
https://notcve.org/view.php?id=CVE-2003-0525
25 Jul 2003 — The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method. La función getCanonicalPath en Windows NT 4.0 puede liberar memoria que no posee y causar una corrupción en el montículo, lo que permite a atacantes causar una denegació... • http://www.atstake.com/research/advisories/2003/a072303-1.txt •

CVE-2003-0352 – Microsoft RPC DCOM Interface - Remote Overflow (MS03-026)
https://notcve.org/view.php?id=CVE-2003-0352
17 Jul 2003 — Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms. Desbordamiento de búfer en una cierta interfaz RPC DCOM en Microsoft Windows NT4, 2000, XP y 2003 permite a atacantes remotos ejecutar código arbitrario mediante un mensaje malformado. • https://www.exploit-db.com/exploits/16749 •

CVE-2003-0345
https://notcve.org/view.php?id=CVE-2003-0345
10 Jul 2003 — Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. Desbordamiento de búfer en el Bloque de Mensajes de Servidor (SMB) en Microsoft Windows XP, 2000 y NT permite a atacantes remotos causar la Denegación de Servicios (DoS) y posiblemente ejecutar código arbitrario mediante un paquete SMB que especifica una longitud de búfe... • http://secunia.com/advisories/9225 •

CVE-2003-0469 – Microsoft Windows XP/2000/NT 4.0 - HTML Converter HR Align Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0469
28 Jun 2003 — Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario me... • https://www.exploit-db.com/exploits/22824 •

CVE-2003-0227 – Microsoft Windows Media Services - 'nsiislog.dll' Remote Overflow
https://notcve.org/view.php?id=CVE-2003-0227
30 May 2003 — The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request. La librería nsisslog.dll de la extensión ISAPI de Microsoft Winodws Media Services en Windows NT 4.0 y 2000 permite que atacante remotos provoquen una denegación de servicio en el Internet ... • https://www.exploit-db.com/exploits/56 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2003-0112
https://notcve.org/view.php?id=CVE-2003-0112
26 Apr 2003 — Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 •

CVE-2002-1561 – Microsoft Windows XP/2000/NT 4.0 - RPC Service Denial of Service
https://notcve.org/view.php?id=CVE-2002-1561
26 Mar 2003 — The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 •