Exploit Microsoft Windows - DCOM RPC Interface Buffer Overrun

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22917
Проверка EDB
  1. Пройдено
Автор
[email protected]
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2003-0352
Дата публикации
2003-08-11
Код:
source: https://www.securityfocus.com/bid/8205/info
   
A buffer overrun vulnerability has been reported in Microsoft Windows that can be exploited remotely via a DCOM RPC interface that listens on TCP/UDP port 135. The issue is due to insufficient bounds checking of client DCOM object activation requests. Exploitation of this issue could result in execution of malicious instructions with Local System privileges on an affected system.
   
This issue may be exposed on other ports that the RPC Endpoint Mapper listens on, such as TCP ports 139, 135, 445 and 593. This has not been confirmed. Under some configurations the Endpoint Mapper may receive traffic via port 80.
   
** There have been unconfirmed reports that Windows 9x systems with certain software installed may also be vulnerable to this issue. Reportedly, Windows 98 systems with .NET software installed may be vulnerable according to scans using various DCOM RPC vulnerability scanning tools. Symantec has not confirmed this behaviour and it may in fact be due to false positives generated by the scanners.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22917.zip
 
Источник
www.exploit-db.com

Похожие темы