7.5
CVSSv2

CVE-2003-0717

Published: 17/11/2003 Updated: 30/04/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote malicious users to execute arbitrary code via a buffer overflow attack.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2003 server r2

microsoft windows 2003 server standard

microsoft windows 2003 server web

microsoft windows nt 4.0

microsoft windows xp

microsoft windows 2003 server enterprise_64-bit

microsoft windows me

microsoft windows 2003 server enterprise

Exploits

/*******************************************************************/ /* [Crpt] MS03-043 - Messenger exploit by MrNice [Crpt] */ /* --------------------------------------------------------------- */ /* ...
/* DoS Proof of Concept for MS03-043 - exploitation shouldn't be too hard Launching it one or two times against the target should make the machine reboot Tested against a Win2K SP4 "The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer" according ...
source: wwwsecurityfocuscom/bid/8826/info Microsoft Windows Messenger Service is prone to a remotely exploitable buffer overrun vulnerability This is due to insufficient bounds checking of messages before they are passed to an internal buffer Exploitation could result in a denial of service or in execution of malicious code in Local Sys ...
/* Mon Oct 20 14:26:55 NZDT 2003 Re-written By VeNoMouS to be ported to linux, and tidy it up a little This was only like a 5 minute port but it works and has been tested venomgen-xconz <mailto:venomgen-xconz> greets to str0ke and defy DoS Proof of Concept for MS03-043 - exploitation shouldn't be too hard Launching it ...