// For flags

CVE-2003-0533

Microsoft LSASS Service - DsRolerUpgradeDownlevelServer Overflow (MS04-011)

Severity Score

8.4
*CVSS v3

Exploit Likelihood

88.8%
*EPSS

Affected Versions

8
*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.

Desbordamiento de búfer basado en la pila en ciertas funciones de servicio de Active Directory en LSASRV.DLL de Local Security Authority Subsystem Service (LSASS) en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, XP SP1, Server 2003, NetMeeting, Windows 98, y Windows ME permite a atacantes remotos ejecutar código arbitrario mediante un paquete que causa que la función DsRolerUpgradeDownlevelServer cree entradas de depuración largas en el fichero DCPROMO.LOG, como las explotadas por el gusano Sasser.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-07-08 CVE Reserved
  • 2004-04-16 CVE Published
  • 2004-04-24 First Exploit
  • 2024-08-08 CVE Updated
  • 2025-03-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions (8)