ID CVE-2004-0193
Summary Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
References
Vulnerable Configurations
  • cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
    cpe:2.3:a:iss:blackice_agent_server:3.6eca:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*
    cpe:2.3:a:iss:blackice_pc_protection:3.6cbd:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
    cpe:2.3:a:iss:blackice_server_protection:3.6cbz:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_desktop:3.6eca:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_desktop:7.0ebg:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_desktop:7.0epk:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_guard:3.6ecb:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_network:7.0:xpu_20.15:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_network:7.0:xpu_20.15:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_sentry:3.6ecf:*:*:*:*:*:*:*
  • cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu20.16:*:*:*:*:*:*
    cpe:2.3:a:iss:realsecure_server_sensor:7.0:xpu20.16:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.30:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.30:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 9752
bugtraq 20040227 EEYE: RealSecure/BlackICE Server Message Block (SMB) Processing Overflow
cert-vn VU#150326
eeye AD20040226
iss 20040226 Vulnerability in SMB Parsing in ISS Products
misc http://www.eeye.com/html/Research/Upcoming/20040213.html
osvdb 4072
secunia 10988
xf pam-smb-protocol-bo(15207)
Last major update 10-10-2017 - 01:30
Published 15-03-2004 - 05:00
Last modified 10-10-2017 - 01:30
Back to Top