Lucene search

K
cve[email protected]CVE-2004-0193
HistorySep 01, 2004 - 4:00 a.m.

CVE-2004-0193

2004-09-0104:00:00
web.nvd.nist.gov
29
cve-2004-0193
buffer overflow
iss protocol analysis module
realsecure
proventia
smb packet
remote code execution

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8.2 High

AI Score

Confidence

Low

0.244 Low

EPSS

Percentile

96.7%

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.

Affected configurations

NVD
Node
issblackice_agent_serverMatch3.6eca
OR
issblackice_pc_protectionMatch3.6cbd
OR
issblackice_server_protectionMatch3.6cbz
OR
issrealsecure_desktopMatch3.6eca
OR
issrealsecure_desktopMatch3.6ecf
OR
issrealsecure_desktopMatch7.0ebg
OR
issrealsecure_desktopMatch7.0epk
OR
issrealsecure_guardMatch3.6ecb
OR
issrealsecure_networkMatch7.0xpu_20.15
OR
issrealsecure_sentryMatch3.6ecf
OR
issrealsecure_server_sensorMatch7.0xpu20.16
Node
issproventia_a_series_xpuMatch20.15
OR
issproventia_g_series_xpuMatch22.3
OR
issproventia_m_series_xpuMatch1.30

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

8.2 High

AI Score

Confidence

Low

0.244 Low

EPSS

Percentile

96.7%

Related for CVE-2004-0193