7.5
CVSSv2

CVE-2002-0724

Published: 24/09/2002 Updated: 30/04/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows malicious users to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows nt 4.0

microsoft windows xp

Vendor Advisories

This advisory describes vulnerabilities that affect Cisco products and applications that are installed on Microsoft operating systems incorporating the use of the Server Message Block (SMB) file sharing protocol It is based on the vulnerabilities in Microsoft's SMB protocol, not due to a defect of the Cisco product or application Vuln ...

Exploits

source: wwwsecurityfocuscom/bid/5556/info Microsoft Windows operating systems use the Server Message Block (SMB) protocol to support services such as file and printer sharing A buffer overflow vulnerability has been reporting in the handling of some malformed SMB requests An attacker may send a malformed SMB request packet in order to ...
source: wwwsecurityfocuscom/bid/5556/info Microsoft Windows operating systems use the Server Message Block (SMB) protocol to support services such as file and printer sharing A buffer overflow vulnerability has been reporting in the handling of some malformed SMB requests An attacker may send a malformed SMB request packet in order t ...