CVE-2003-0345
https://notcve.org/view.php?id=CVE-2003-0345
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. Desbordamiento de búfer en el Bloque de Mensajes de Servidor (SMB) en Microsoft Windows XP, 2000 y NT permite a atacantes remotos causar la Denegación de Servicios (DoS) y posiblemente ejecutar código arbitrario mediante un paquete SMB que especifica una longitud de búfer menor que la requerida. • http://secunia.com/advisories/9225 http://securitytracker.com/id?1007154 http://www.kb.cert.org/vuls/id/337764 http://www.securityfocus.com/bid/8152 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024 https://exchange.xforce.ibmcloud.com/vulnerabilities/12544 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A118 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146 https://oval.cisecurity.org •
CVE-2003-0469 – Microsoft Windows XP/2000/NT 4.0 - HTML Converter HR Align Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0469
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario mediante una operación de cortar-y-pegar, como se ha demostrado en Internet Explorer 5.0 usando un arguemento "align" larga en una etiqueta HR. • https://www.exploit-db.com/exploits/22824 http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006155.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/006067.html http://marc.info/?l=bugtraq&m=105639925122961&w=2 http://www.cert.org/advisories/CA-2003-14.html http://www.kb.cert.org/vuls/id/823260 http://www.securityfocus.com/bid/8016 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023 •
CVE-2003-0227 – Microsoft Windows Media Services - 'nsiislog.dll' Remote Overflow
https://notcve.org/view.php?id=CVE-2003-0227
The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request. La librería nsisslog.dll de la extensión ISAPI de Microsoft Winodws Media Services en Windows NT 4.0 y 2000 permite que atacante remotos provoquen una denegación de servicio en el Internet Information Server (IIS) mediante una cierta petición de red. • https://www.exploit-db.com/exploits/56 http://marc.info/?l=bugtraq&m=105427615626177&w=2 http://marc.info/?l=ntbugtraq&m=105421127531558&w=2 http://marc.info/?l=ntbugtraq&m=105421176432011&w=2 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A936 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A966 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2003-0112
https://notcve.org/view.php?id=CVE-2003-0112
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 http://www.securityfocus.com/bid/7370 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/11803 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1264 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A142 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2022 https://oval •
CVE-2002-1561 – Microsoft Windows XP/2000/NT 4.0 - RPC Service Denial of Service
https://notcve.org/view.php?id=CVE-2002-1561
The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 https://www.exploit-db.com/exploits/21953 https://www.exploit-db.com/exploits/21954 https://www.exploit-db.com/exploits/21952 http://www.kb.cert.org/vuls/id/261537 http://www.securityfocus.com/archive/1/296114/2002-10-14/2002-10-20/0 http://www.securityfocus.com/bid/6005 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •