10
CVSSv2

CVE-2003-0201

Published: 05/05/2003 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x prior to 2.2.8a, 2.0.10 and previous versions 2.0.x versions, and Samba-TNG prior to 0.3.2, allows remote malicious users to execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 2.2.1a

samba samba 2.0.10

samba-tng samba-tng 0.3.1

samba samba 2.0.1

samba samba 2.2.3a

samba samba 2.0.2

samba samba 2.0.6

samba samba 2.0.4

samba samba 2.2.7a

samba samba 2.2.4

samba samba 2.0.9

samba samba 2.0.3

samba samba 2.2.6

samba samba 2.2.8

samba samba 2.2.0a

samba samba 2.0.7

samba samba 2.0.8

samba samba 2.0.5

samba samba 2.2.0

samba samba 2.0.0

samba samba 2.2.5

samba samba 2.2.7

samba-tng samba-tng 0.3

compaq tru64 5.0a pk3 bl17

hp hp-ux 11.11

compaq tru64 5.1 pk3 bl17

hp hp-ux 10.01

compaq tru64 4.0d pk9 bl17

sun solaris 2.5.1

apple mac os x 10.2.1

hp hp-ux 11.04

compaq tru64 5.1 pk4 bl18

compaq tru64 4.0d

compaq tru64 5.0 pk4 bl18

compaq tru64 5.0 pk4 bl17

compaq tru64 5.0

compaq tru64 5.1b pk1 bl1

sun sunos 5.7

compaq tru64 4.0f pk6 bl17

compaq tru64 4.0g

compaq tru64 4.0g pk3 bl17

apple mac os x 10.2.4

sun sunos 5.8

sun solaris 9.0

compaq tru64 5.0a

apple mac os x 10.2.2

hp hp-ux 11.00

compaq tru64 5.1a pk3 bl3

compaq tru64 4.0f

compaq tru64 4.0b

hp hp-ux 10.24

sun solaris 7.0

hp hp-ux 11.22

compaq tru64 5.1 pk6 bl20

compaq tru64 5.1 pk5 bl19

compaq tru64 5.1a

sun sunos 5.5.1

hp hp-ux 10.20

compaq tru64 5.1b

compaq tru64 5.1

compaq tru64 5.1a pk2 bl2

compaq tru64 5.0f

apple mac os x 10.2.3

compaq tru64 4.0f pk7 bl18

hp hp-ux 11.20

sun solaris 2.6

compaq tru64 5.1a pk1 bl1

apple mac os x 10.2

sun solaris 8.0

sun sunos -

hp cifs-9000 server a.01.08.01

hp cifs-9000 server a.01.06

hp cifs-9000 server a.01.07

hp cifs-9000 server a.01.09

hp cifs-9000 server a.01.09.01

hp cifs-9000 server a.01.05

hp cifs-9000 server a.01.08

hp cifs-9000 server a.01.09.02

Exploits

## # $Id: trans2openrb 9828 2010-07-14 17:27:23Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metaspl ...
/* Remote root exploit for Samba 22x and prior that works against Linux (all distributions), FreeBSD (4x, 5x), NetBSD (1x) and OpenBSD (2x, 3x and 32 non-executable stack) sambalc is able to identify samba boxes It will send a netbios name packet to port 137 If the box responds with the mac address 00-00-00-00 ...
/* source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitat ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploita ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...
/* * Mass Samba Exploit by Schizoprenic * Xnuxer-Research (c) 2003 * This code just for eduction purpose */ #include <stdioh> #include <stdlibh> #include <sys/stath> void usage(char *s) { printf("Usage: %s \n",s); exit(-1); } int main(int argc, char **argv) { printf("Mass Samba Exploit by Schizoprenic\n"); ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitati ...
## # $Id: trans2openrb 9571 2010-06-21 16:53:52Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
source: wwwsecurityfocuscom/bid/7294/info A buffer overflow vulnerability has been reported for Samba The problem occurs when copying user-supplied data into a static buffer By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory Successful exploitation o ...
#!/usr/bin/perl ############### ##[ Header # Name: trans2rootpl # Purpose: Proof of concept exploit for Samba 22x (trans2open overflow) # Author: H D Moore <hdmoore@digitaldefensenet> # Copyright: Copyright (C) 2003 Digital Defense Inc # trans2rootpl <options> -t <target type> -H <your ip> - ...
## # $Id: trans2openrb 9571 2010-06-21 16:53:52Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
## # $Id: trans2openrb 9552 2010-06-17 22:11:43Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...

Github Repositories

Reporte de resultados de la vulnerabilidad encontrada en el protocolo smb de kioptrix level 1

Vulnerabilidad en puerto 139 / protocolo smb Descripción SMB (Server Message Block) es un protocolo cliente-servidor que controla el acceso a archivos y directorios enteros, así como a otros recursos de la red, como impresoras, routers o interfaces compartidas con la red Una vulneración a este protocolo podría significar el acceso no autorizado de u

Reporte Vulnerabilidad Openluck Kioptrix nivel 1 Descripcion SSL es una tecnología estandarizada que permite cifrar el tráfico de datos entre un navegador web y un sitio web (o entre dos servidores web), protegiendo así la conexión Esto impide que un hacker pueda ver o interceptar la información que se transmite de un punto a otro, y que pued

Samba exploit CVE2003-0201

Samba versions 220 to 228 This exploits the buffer overflow found in Samba versions 220 to 228 This particular module is capable of exploiting the flaw on x86 Linux systems that do not have the noexec stack option set NOTE: Some older versions of RedHat do not seem to be vulnerable since they apparently do not allow anonymous access to IPC CVE CVE-2003-0201 OSVDB-44