10
CVSSv2

CVE-2003-0201

Published: 05/05/2003 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x prior to 2.2.8a, 2.0.10 and previous versions 2.0.x versions, and Samba-TNG prior to 0.3.2, allows remote malicious users to execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 2.0.3

samba samba 2.0.4

samba samba 2.2.1a

samba samba 2.2.3a

samba samba 2.0.10

samba samba 2.0.2

samba samba 2.2.0

samba samba 2.2.0a

samba samba 2.2.7a

samba samba 2.2.8

samba-tng samba-tng 0.3

samba-tng samba-tng 0.3.1

samba samba 2.0.5

samba samba 2.0.6

samba samba 2.0.7

samba samba 2.2.4

samba samba 2.2.5

samba samba 2.0.0

samba samba 2.0.1

samba samba 2.0.8

samba samba 2.0.9

samba samba 2.2.6

samba samba 2.2.7

apple mac os x 10.2

compaq tru64 4.0d_pk9_bl17

compaq tru64 4.0f

compaq tru64 4.0f_pk6_bl17

compaq tru64 5.0a

compaq tru64 5.0a_pk3_bl17

compaq tru64 4.0b

compaq tru64 4.0d

compaq tru64 5.0_pk4_bl17

compaq tru64 5.0_pk4_bl18

compaq tru64 5.1_pk5_bl19

compaq tru64 5.1_pk6_bl20

hp hp-ux 10.01

hp hp-ux 10.20

hp hp-ux 10.24

sun solaris 2.5.1

sun solaris 9.0

compaq tru64 5.1a

compaq tru64 5.1a_pk1_bl1

hp hp-ux 11.00

hp hp-ux 11.04

sun solaris 2.6

sun sunos -

apple mac os x 10.2.1

apple mac os x 10.2.2

compaq tru64 4.0f_pk7_bl18

compaq tru64 4.0g

compaq tru64 5.0f

compaq tru64 5.1

compaq tru64 5.1a_pk2_bl2

compaq tru64 5.1a_pk3_bl3

hp hp-ux 11.11

hp hp-ux 11.20

sun sunos 5.7

sun solaris 7.0

apple mac os x 10.2.3

apple mac os x 10.2.4

compaq tru64 4.0g_pk3_bl17

compaq tru64 5.0

compaq tru64 5.1_pk3_bl17

compaq tru64 5.1_pk4_bl18

compaq tru64 5.1b

compaq tru64 5.1b_pk1_bl1

hp hp-ux 11.22

sun sunos 5.5.1

sun sunos 5.8

sun solaris 8.0

hp cifs-9000 server a.01.09

hp cifs-9000 server a.01.09.01

hp cifs-9000 server a.01.09.02

hp cifs-9000 server a.01.05

hp cifs-9000 server a.01.06

hp cifs-9000 server a.01.07

hp cifs-9000 server a.01.08

hp cifs-9000 server a.01.08.01

Exploits

/* Remote root exploit for Samba 22x and prior that works against Linux (all distributions), FreeBSD (4x, 5x), NetBSD (1x) and OpenBSD (2x, 3x and 32 non-executable stack) sambalc is able to identify samba boxes It will send a netbios name packet to port 137 If the box responds with the mac address 00-00-00-00 ...
/* source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitat ...
## # $Id: trans2openrb 9828 2010-07-14 17:27:23Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metaspl ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploita ...
/* * Mass Samba Exploit by Schizoprenic * Xnuxer-Research (c) 2003 * This code just for eduction purpose */ #include <stdioh> #include <stdlibh> #include <sys/stath> void usage(char *s) { printf("Usage: %s \n",s); exit(-1); } int main(int argc, char **argv) { printf("Mass Samba Exploit by Schizoprenic\n"); ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitati ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitation o ...
## # $Id: trans2openrb 9571 2010-06-21 16:53:52Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
## # $Id: trans2openrb 9571 2010-06-21 16:53:52Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
#!/usr/bin/perl ############### ##[ Header # Name: trans2rootpl # Purpose: Proof of concept exploit for Samba 22x (trans2open overflow) # Author: H D Moore <hdmoore@digitaldefensenet> # Copyright: Copyright (C) 2003 Digital Defense Inc # trans2rootpl <options> -t <target type> -H <your ip> - ...
## # $Id: trans2openrb 9552 2010-06-17 22:11:43Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...

Github Repositories

Reporte Vulnerabilidad Openluck Kioptrix nivel 1 Descripcion SSL es una tecnología estandarizada que permite cifrar el tráfico de datos entre un navegador web y un sitio web (o entre dos servidores web), protegiendo así la conexión Esto impide que un hacker pueda ver o interceptar la información que se transmite de un punto a otro, y que pued

Reporte de resultados de la vulnerabilidad encontrada en el protocolo smb de kioptrix level 1

Vulnerabilidad en puerto 139 / protocolo smb Descripción SMB (Server Message Block) es un protocolo cliente-servidor que controla el acceso a archivos y directorios enteros, así como a otros recursos de la red, como impresoras, routers o interfaces compartidas con la red Una vulneración a este protocolo podría significar el acceso no autorizado de u

Samba exploit CVE2003-0201

Samba versions 220 to 228 This exploits the buffer overflow found in Samba versions 220 to 228 This particular module is capable of exploiting the flaw on x86 Linux systems that do not have the noexec stack option set NOTE: Some older versions of RedHat do not seem to be vulnerable since they apparently do not allow anonymous access to IPC CVE CVE-2003-0201 OSVDB-44