var-200306-0042
Vulnerability from variot

Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page. Versions of the OpenSSH server prior to 3.7.1 contain buffer management errors. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. A vulnerability exists in Microsoft's Remote Procedure Call (RPC) implementation. A remote attacker could exploit this vulnerability to cause a denial of service. An exploit for this vulnerability is publicly available. A Microsoft Windows DirectX library, quartz.dll, does not properly validate certain parameters in Musical Instrument Digital Interface (MIDI) files. A remotely exploitable vulnerability has been discovered in Internet Explorer. A remote attacker could execute arbitrary code with the privileges of the user running IE. When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. Description

Microsoft Windows operating systems include multimedia technologies called DirectX and DirectShow. From Microsoft Security Bulletin MS03-030, "DirectX consists of a set of low-level Application Programming Interfaces (APIs) that are used by Windows programs for multimedia support.

Any application that uses DirectX/DirectShow to process MIDI files may be affected by this vulnerability. Of particular concern, Internet Explorer (IE) uses the Windows Media Player ActiveX control and quartz.dll to handle MIDI files embedded in HTML documents. An attacker could therefore exploit this vulnerability by convincing a victim to view an HTML document, such as a web page or an HTML email message, that contains an embedded MIDI file. Note that in addition to IE, a number of applications, including Outlook, Outlook Express, Eudora, AOL, Lotus Notes, and Adobe PhotoDeluxe, use the WebBrowser ActiveX control to interpret HTML documents.

Further technical details are available in eEye Digital Security advisory AD20030723. Common Vulnerabilities and Exposures (CVE) refers to these vulnerabilities as CAN-2003-0346.

Disable embedded MIDI files

Change the Run ActiveX controls and plug-ins security setting to Disable in the Internet zone and the zone(s) used by Outlook, Outlook Express, and any other application that uses the WebBrowser ActiveX control to render HTML. This modification will prevent MIDI files from being automatically loaded from HTML documents. This workaround is not a complete solution and will not prevent attacks that attempt to load MIDI files directly.

Instructions for modifying IE security zone settings can be found in the CERT/CC Malicious Web Scripts FAQ. References

 * CERT/CC Vulnerability Note VU#561284 -
   http://www.kb.cert.org/vuls/id/561284
 * CERT/CC Vulnerability Note VU#265232 -
   http://www.kb.cert.org/vuls/id/265232
 * eEye Digital Security advisory AD20030723 -
   http://www.eeye.com/html/Research/Advisories/AD20030723.html
 * Microsoft Security Bulletin MS03-030 -
   http://microsoft.com/technet/security/bulletin/MS03-030.asp
 * Microsoft Knowledge Base article 819696 -
   http://support.microsoft.com/default.aspx?scid=kb;en-us;819696
 _________________________________________________________________

These vulnerabilities were researched and reported by eEye Digital Security. ___________

Feedback can be directed to the author, Art Manion. -----BEGIN PGP SIGNED MESSAGE-----

CERT Summary CS-2003-04

November 24, 2003

Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT Summary to draw attention to the types of attacks reported to our incident response team, as well as other noteworthy incident and vulnerability information. The summary includes pointers to sources of information for dealing with the problems.

Past CERT summaries are available from:

      CERT Summaries
      http://www.cert.org/summaries/

Recent Activity

Since the last regularly scheduled CERT summary, issued in September 2003 (CS-2003-03), we have documented vulnerabilities in the Microsoft Windows Workstation Service, RPCSS Service, and Exchange.

For more current information on activity being reported to the CERT/CC, please visit the CERT/CC Current Activity page. The Current Activity page is a regularly updated summary of the most frequent, high-impact types of security incidents and vulnerabilities being reported to the CERT/CC. The information on the Current Activity page is reviewed and updated as reporting trends change.

      CERT/CC Current Activity
      http://www.cert.org/current/current_activity.html


1. W32/Mimail Variants

   The  CERT/CC  has  received reports of several new variants of the
   'Mimail'  worm. The most recent variant of the worm (W32/Mimail.J)
   arrives  as  an  email  message  alleging  to  be  from the Paypal
   financial   service.  The  message  requests  that  the  recipient
   'verify'  their  account  information to prevent the suspension of
   their  Paypal account. Attached to the email is an executable file
   which  captures  this  information (if entered), and sends it to a
   number of email addresses.

            Current Activity - November 19, 2003
            http://www.cert.org/current/archive/2003/11/19/archive.html#mimaili


2.

            CERT Advisory CA-2003-28
    Buffer Overflow in Windows Workstation Service
            http://www.cert.org/advisories/CA-2003-28.html

            Vulnerability Note VU#567620
    Microsoft Windows Workstation service vulnerable to 
    buffer overflow when sent specially crafted network
    message
            http://www.kb.cert.org/vuls/id/567620


3.

            CERT Advisory CA-2003-27
    Multiple Vulnerabilities in Microsoft Windows and 
    Exchange
            http://www.cert.org/advisories/CA-2003-27.html

            Vulnerability Note VU#575892
    Buffer overflow in Microsoft Windows Messenger Service
            http://www.kb.cert.org/vuls/id/575892

            Vulnerability Note VU#422156
    Microsoft Exchange Server fails to properly handle
    specially crafted SMTP extended verb requests
            http://www.kb.cert.org/vuls/id/422156

            Vulnerability Note VU#467036
    Microsoft Windows Help and support Center contains buffer
    overflow in code used to handle HCP protocol
            http://www.kb.cert.org/vuls/id/467036

            Vulnerability Note VU#989932
    Microsoft Windows contains buffer overflow in Local 
    Troubleshooter ActiveX control (Tshoot.ocx)
            http://www.kb.cert.org/vuls/id/989932

            Vulnerability Note VU#838572
    Microsoft Windows Authenticode mechanism installs ActiveX
    controls without prompting user
            http://www.kb.cert.org/vuls/id/838572

            Vulnerability Note VU#435444
    Microsoft Outlook Web Access (OWA) contains cross-site
    scripting vulnerability in the "Compose New Message" form
            http://www.kb.cert.org/vuls/id/435444

            Vulnerability Note VU#967668
    Microsoft Windows ListBox and ComboBox controls vulnerable
    to buffer overflow when supplied crafted Windows message
            http://www.kb.cert.org/vuls/id/967668


4. Multiple Vulnerabilities in SSL/TLS Implementations

   Multiple  vulnerabilities  exist in the Secure Sockets Layer (SSL)
   and  Transport Layer Security (TLS) protocols allowing an attacker
   to execute arbitrary code or cause a denial-of-service condition.

            CERT Advisory CA-2003-26
    Multiple  Vulnerabilities in SSL/TLS Implementations
            http://www.cert.org/advisories/CA-2003-26.html

            Vulnerability Note VU#935264
    OpenSSL ASN.1 parser insecure memory deallocation
            http://www.kb.cert.org/vuls/id/935264

            Vulnerability Note VU#255484
    OpenSSL contains integer overflow handling ASN.1 tags (1)
            http://www.kb.cert.org/vuls/id/255484

            Vulnerability Note VU#380864
    OpenSSL contains integer overflow handling ASN.1 tags (2)
            http://www.kb.cert.org/vuls/id/380864

            Vulnerability Note VU#686224
    OpenSSL does not securely handle invalid public key when
    configured to ignore errors
            http://www.kb.cert.org/vuls/id/686224

            Vulnerability Note VU#732952
    OpenSSL accepts unsolicited client certificate messages
            http://www.kb.cert.org/vuls/id/732952

            Vulnerability Note VU#104280
    Multiple vulnerabilities in SSL/TLS implementations
            http://www.kb.cert.org/vuls/id/104280

            Vulnerability Note VU#412478
    OpenSSL 0.9.6k does not properly handle ASN.1 sequences
            http://www.kb.cert.org/vuls/id/412478


5. These attacks include the
   installation  of tools for launching distributed denial-of-service
   (DDoS)   attacks,   providing   generic  proxy  services,  reading
   sensitive  information  from  the  Windows  registry,  and using a
   victim   system's  modem  to  dial  pay-per-minute  services.  The
   vulnerability  described in VU#865940 exists due to an interaction
   between  IE's  MIME  type  processing  and the way it handles HTML
   application (HTA) files embedded in OBJECT tags. W32/Swen.A Worm

   On  September  19,  the  CERT/CC began receiving a large volume of
   reports  of  a  mass  mailing  worm,  referred  to  as W32/Swen.A,
   spreading on the Internet. Similar to W32/Gibe.B in function, this
   worm  arrives as an attachment claiming to be a Microsoft Internet
   Explorer  Update  or  a  delivery  failure  notice from qmail. The
   W32/Swen.A  worm  requires a user to execute the attachment either
   manually or by using an email client that will open the attachment
   automatically.  Upon  opening the attachment, the worm attempts to
   mail  itself  to  all  email addresses it finds on the system. The
   CERT/CC  updated  the  current  activity  page  to contain further
   information on this worm.

            Current Activity - September 19, 2003
            http://www.cert.org/current/archive/2003/09/19/archive.html#swena


7. Buffer Overflow in Sendmail

   Sendmail,  a widely deployed mail transfer agent (MTA), contains a
   vulnerability  that  could  allow an attacker to execute arbitrary
   code with the privileges of the sendmail daemon, typically root.

            CERT Advisory CA-2003-25
    Buffer Overflow in Sendmail
            http://www.cert.org/advisories/CA-2003-25.html

            Vulnerability Note VU#784980
    Sendmail prescan() buffer overflow vulnerability
            http://www.kb.cert.org/vuls/id/784980


8. RPCSS Vulnerabilities in Microsoft Windows

   On  September  10,  the  CERT/CC reported on three vulnerabilities
   that  affect  numerous versions of Microsoft Windows, two of which
   are  remotely  exploitable  buffer  overflows that may an allow an
   attacker to execute code with system privileges.

            CERT Advisory CA-2003-23
    RPCSS Vulnerabilities in Microsoft Windows
            http://www.cert.org/advisories/CA-2003-23.html

            Vulnerability Note VU#483492
    Microsoft Windows RPCSS Service contains heap overflow in
    DCOM activation routines
            http://www.kb.cert.org/vuls/id/483492

            Vulnerability Note VU#254236
    Microsoft Windows RPCSS Service contains heap overflow in
    DCOM request filename handling
            http://www.kb.cert.org/vuls/id/254236

            Vulnerability Note VU#326746
    Microsoft Windows RPC service vulnerable to 
    denial of service
            http://www.kb.cert.org/vuls/id/326746

New CERT Coordination Center (CERT/CC) PGP Key

On October 15, the CERT/CC issued a new PGP key, which should be used when sending sensitive information to the CERT/CC.

      CERT/CC PGP Public Key
      https://www.cert.org/pgp/cert_pgp_key.asc

      Sending Sensitive Information to the CERT/CC
      https://www.cert.org/contact_cert/encryptmail.html

What's New and Updated

Since the last CERT Summary, we have published new and updated * Advisories http://www.cert.org/advisories/ * Vulnerability Notes http://www.kb.cert.org/vuls * CERT/CC Statistics http://www.cert.org/stats/cert_stats.html * Congressional Testimony http://www.cert.org/congressional_testimony * Training Schedule http://www.cert.org/training/ * CSIRT Development http://www.cert.org/csirts/


This document is available from: http://www.cert.org/summaries/CS-2003-04.html


CERT/CC Contact Information

Email: cert@cert.org Phone: +1 412-268-7090 (24-hour hotline) Fax: +1 412-268-6989 Postal address: CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 U.S.A.

CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more information.

Getting security information

CERT publications and other security information are available from our web site http://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo@cert.org. Please include in the body of your message

subscribe cert-advisory

  • "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office.

NO WARRANTY Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.


Conditions for use, disclaimers, and sponsorship information

Copyright \xa92003 Carnegie Mellon University.

-----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8

iQCVAwUBP8JVOZZ2NNT/dVAVAQGL9wP+I18NJBUBuv7b0pam5La7E7qOQFMn5n78 7i0gBX/dKgaY5siM6jBYYwCbbA7Y0/Jwtby2zHp1s8RHZY5/3JEzElfv4TLlR8rT rb8gJDbpan2JWA6xH9IzqZaSrxrXpNypwU2wWxR2osmbYl8FdV0rD3ZYXJjyi+nU UENALuNdthA= =DD60 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2003-19 Exploitation of Vulnerabilities in Microsoft RPC Interface

Original issue date: July 31, 2003 Last revised: - Source: CERT/CC

A complete revision history is at the end of this file.

I. Known exploits target TCP port 135 and create a privileged backdoor command shell on successfully compromised hosts. Some versions of the exploit use TCP port 4444 for the backdoor, and other versions use a TCP port number specified by the intruder at run-time. We have also received reports of scanning activity for common backdoor ports such as 4444/TCP. In some cases, due to the RPC service terminating, a compromised system may reboot after the backdoor is accessed by an intruder. Based on current information, we believe this vulnerability is separate and independent from the RPC vulnerability addressed in MS03-026. The CERT/CC is tracking this additional vulnerability as VU#326746 and is continuing to work to understand the issue and mitigation strategies.

In both of the attacks described above, a TCP session to port 135 is used to execute the attack. However, access to TCP ports 139 and 445 may also provide attack vectors and should be considered when applying mitigation strategies.

II.

III. Solutions

Apply patches

All users are encouraged to apply the patches referred to in Microsoft Security Bulletin MS03-026 as soon as possible in order to mitigate the vulnerability described in VU#568148. These patches are also available via Microsoft's Windows Update service.

Systems running Windows 2000 may still be vulnerable to at least a denial of service attack via VU#326746 if their DCOM RPC service is available via the network. Therefore, sites are encouraged to use the packet filtering tips below in addition to applying the patches supplied in MS03-026.

Filter network traffic

Sites are encouraged to block network access to the RPC service at network borders. This can minimize the potential of denial-of-service attacks originating from outside the perimeter. The specific services that should be blocked include * 135/TCP * 135/UDP * 139/TCP * 139/UDP * 445/TCP * 445/UDP

If access cannot be blocked for all external hosts, the CERT/CC recommends limiting access to only those hosts that require it for normal operation. As a general rule, the CERT/CC recommends filtering all types of network traffic that are not required for normal operation.

Because current exploits for VU#568148 create a backdoor, which is in some cases 4444/TCP, blocking inbound TCP sessions to ports on which no legitimate services are provided may limit intruder access to compromised hosts.

Recovering from a system compromise

If you believe a system under your administrative control has been compromised, please follow the steps outlined in

      Steps for Recovering from a UNIX or NT System Compromise

Reporting

The CERT/CC is tracking activity related to exploitation of the first vulnerability (VU#568148) as CERT#27479 and the second vulnerability (VU#326746) as CERT#24523. Relevant artifacts or activity can be sent to cert@cert.org with the appropriate CERT# in the subject line.

Appendix A. Vendor Information

This appendix contains information provided by vendors. If a vendor is not listed below, we have not received their comments.

Microsoft

 Please see Microsoft Security Bulletin MS03-026.

Appendix B

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200306-0042",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 4.0,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "microsoft",
        "version": "5.5"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "microsoft",
        "version": "5.01"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "mandriva",
        "version": null
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "appgate network security ab",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cray",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "cyclades",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "f secure",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "foundry",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "guardian digital",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm eserver",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ingrian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mirapoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "network appliance",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nokia",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openssh",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openwall gnu linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "riverstone",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "tfs",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "trustix secure linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "vmware",
        "version": null
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "microsoft",
        "version": "6"
      },
      {
        "model": "windows server 2003",
        "scope": null,
        "trust": 0.8,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "5.5"
      },
      {
        "model": "ie",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "microsoft",
        "version": "5.01"
      },
      {
        "model": "internet explorer sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.0.1"
      },
      {
        "model": "internet explorer sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.0.1"
      },
      {
        "model": "internet explorer sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.0.1"
      },
      {
        "model": "internet explorer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.0.1"
      },
      {
        "model": "internet explorer sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "6.0"
      },
      {
        "model": "internet explorer sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.5"
      },
      {
        "model": "internet explorer sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "microsoft",
        "version": "5.5"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "BID",
        "id": "7806"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:microsoft:ie:6.0:*:windows_server_2003:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Derek Soeder\u203b dsoeder@eeye.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0344",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2003-0344",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 1.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2003-0344",
            "trust": 1.8,
            "value": "High"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#333628",
            "trust": 0.8,
            "value": "28.98"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#813208",
            "trust": 0.8,
            "value": "3.65"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#326746",
            "trust": 0.8,
            "value": "27.00"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#561284",
            "trust": 0.8,
            "value": "29.84"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#679556",
            "trust": 0.8,
            "value": "17.47"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#334928",
            "trust": 0.8,
            "value": "7.09"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200306-069",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page. Versions of the OpenSSH server prior to 3.7.1 contain buffer management errors. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. A vulnerability exists in Microsoft\u0027s Remote Procedure Call (RPC) implementation. A remote attacker could exploit this vulnerability to cause a denial of service. An exploit for this vulnerability is publicly available. A Microsoft Windows DirectX library, quartz.dll, does not properly validate certain parameters in Musical Instrument Digital Interface (MIDI) files. A remotely exploitable vulnerability has been discovered in Internet Explorer.  A remote attacker could execute arbitrary code with the privileges of the user running IE.  When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. Description\n\n   Microsoft  Windows  operating  systems include multimedia technologies\n   called  DirectX  and  DirectShow.  From  Microsoft  Security  Bulletin\n   MS03-030,   \"DirectX  consists  of  a  set  of  low-level  Application\n   Programming  Interfaces  (APIs)  that are used by Windows programs for\n   multimedia support. \n\n   Any application that uses DirectX/DirectShow to process MIDI files may\n   be  affected  by  this  vulnerability. Of particular concern, Internet\n   Explorer  (IE)  uses  the  Windows  Media  Player  ActiveX control and\n   quartz.dll  to  handle  MIDI  files  embedded  in  HTML  documents. An\n   attacker  could  therefore  exploit this vulnerability by convincing a\n   victim  to  view an HTML document, such as a web page or an HTML email\n   message, that contains an embedded MIDI file. Note that in addition to\n   IE,  a  number  of  applications,  including Outlook, Outlook Express,\n   Eudora,  AOL,  Lotus  Notes, and Adobe PhotoDeluxe, use the WebBrowser\n   ActiveX control to interpret HTML documents. \n\n   Further  technical  details  are  available  in  eEye Digital Security\n   advisory AD20030723. Common Vulnerabilities and Exposures (CVE) refers\n   to these vulnerabilities as CAN-2003-0346. \n\nDisable embedded MIDI files\n\n   Change  the  Run  ActiveX  controls  and  plug-ins security setting to\n   Disable  in the Internet zone and the zone(s) used by Outlook, Outlook\n   Express,  and  any  other application that uses the WebBrowser ActiveX\n   control to render HTML. This modification will prevent MIDI files from\n   being automatically loaded from HTML documents. This workaround is not\n   a  complete solution and will not prevent attacks that attempt to load\n   MIDI files directly. \n\n   Instructions  for  modifying IE security zone settings can be found in\n   the CERT/CC Malicious Web Scripts FAQ. References\n\n     * CERT/CC Vulnerability Note VU#561284 -\n       http://www.kb.cert.org/vuls/id/561284\n     * CERT/CC Vulnerability Note VU#265232 -\n       http://www.kb.cert.org/vuls/id/265232\n     * eEye Digital Security advisory AD20030723 -\n       http://www.eeye.com/html/Research/Advisories/AD20030723.html\n     * Microsoft Security Bulletin MS03-030 -\n       http://microsoft.com/technet/security/bulletin/MS03-030.asp\n     * Microsoft Knowledge Base article 819696 -\n       http://support.microsoft.com/default.aspx?scid=kb;en-us;819696\n     _________________________________________________________________\n\n   These  vulnerabilities were  researched and reported by  eEye  Digital\n   Security. \n     _________________________________________________________________\n\n   Feedback can be directed to the author, Art Manion. \n-----BEGIN PGP SIGNED MESSAGE-----\n\nCERT Summary CS-2003-04\n\n   November 24, 2003\n\n   Each  quarter, the CERT Coordination Center (CERT/CC) issues the CERT\n   Summary  to  draw  attention  to  the types of attacks reported to our\n   incident  response  team,  as  well  as  other noteworthy incident and\n   vulnerability information. The summary includes pointers to sources of\n   information for dealing with the problems. \n\n   Past CERT summaries are available from:\n\n          CERT Summaries\n          http://www.cert.org/summaries/\n   ______________________________________________________________________\n\nRecent Activity\n\n   Since  the  last regularly scheduled CERT summary, issued in September\n   2003 (CS-2003-03), we have documented vulnerabilities in the Microsoft\n   Windows Workstation Service, RPCSS Service, and Exchange. \n\n   For  more  current  information  on  activity  being  reported  to the\n   CERT/CC,  please  visit the CERT/CC Current Activity page. The Current\n   Activity  page  is  a  regularly updated summary of the most frequent,\n   high-impact  types  of  security  incidents  and vulnerabilities being\n   reported  to the CERT/CC. The information on the Current Activity page\n   is reviewed and updated as reporting trends change. \n\n          CERT/CC Current Activity\n          http://www.cert.org/current/current_activity.html\n\n\n    1. W32/Mimail Variants\n\n       The  CERT/CC  has  received reports of several new variants of the\n       \u0027Mimail\u0027  worm. The most recent variant of the worm (W32/Mimail.J)\n       arrives  as  an  email  message  alleging  to  be  from the Paypal\n       financial   service.  The  message  requests  that  the  recipient\n       \u0027verify\u0027  their  account  information to prevent the suspension of\n       their  Paypal account. Attached to the email is an executable file\n       which  captures  this  information (if entered), and sends it to a\n       number of email addresses. \n\n                Current Activity - November 19, 2003\n                http://www.cert.org/current/archive/2003/11/19/archive.html#mimaili\n\n\n    2. \n\n                CERT Advisory CA-2003-28\n\t\tBuffer Overflow in Windows Workstation Service\n                http://www.cert.org/advisories/CA-2003-28.html\n\n                Vulnerability Note VU#567620\n\t\tMicrosoft Windows Workstation service vulnerable to \n\t\tbuffer overflow when sent specially crafted network\n\t\tmessage\n                http://www.kb.cert.org/vuls/id/567620\n\n\n    3. \n\n                CERT Advisory CA-2003-27\n\t\tMultiple Vulnerabilities in Microsoft Windows and \n\t\tExchange\n                http://www.cert.org/advisories/CA-2003-27.html\n\n                Vulnerability Note VU#575892\n\t\tBuffer overflow in Microsoft Windows Messenger Service\n                http://www.kb.cert.org/vuls/id/575892\n\n                Vulnerability Note VU#422156\n\t\tMicrosoft Exchange Server fails to properly handle\n\t\tspecially crafted SMTP extended verb requests\n                http://www.kb.cert.org/vuls/id/422156\n\n                Vulnerability Note VU#467036\n\t\tMicrosoft Windows Help and support Center contains buffer\n\t\toverflow in code used to handle HCP protocol\n                http://www.kb.cert.org/vuls/id/467036\n\n                Vulnerability Note VU#989932\n\t\tMicrosoft Windows contains buffer overflow in Local \n\t\tTroubleshooter ActiveX control (Tshoot.ocx)\n                http://www.kb.cert.org/vuls/id/989932\n\n                Vulnerability Note VU#838572\n\t\tMicrosoft Windows Authenticode mechanism installs ActiveX\n\t\tcontrols without prompting user\n                http://www.kb.cert.org/vuls/id/838572\n\n                Vulnerability Note VU#435444\n\t\tMicrosoft Outlook Web Access (OWA) contains cross-site\n\t\tscripting vulnerability in the \"Compose New Message\" form\n                http://www.kb.cert.org/vuls/id/435444\n\n                Vulnerability Note VU#967668\n\t\tMicrosoft Windows ListBox and ComboBox controls vulnerable\n\t\tto buffer overflow when supplied crafted Windows message\n                http://www.kb.cert.org/vuls/id/967668\n\n\n    4. Multiple Vulnerabilities in SSL/TLS Implementations\n\n       Multiple  vulnerabilities  exist in the Secure Sockets Layer (SSL)\n       and  Transport Layer Security (TLS) protocols allowing an attacker\n       to execute arbitrary code or cause a denial-of-service condition. \n\n                CERT Advisory CA-2003-26\n\t\tMultiple  Vulnerabilities in SSL/TLS Implementations\n                http://www.cert.org/advisories/CA-2003-26.html\n\n                Vulnerability Note VU#935264\n\t\tOpenSSL ASN.1 parser insecure memory deallocation\n                http://www.kb.cert.org/vuls/id/935264\n\n                Vulnerability Note VU#255484\n\t\tOpenSSL contains integer overflow handling ASN.1 tags (1)\n                http://www.kb.cert.org/vuls/id/255484\n\n                Vulnerability Note VU#380864\n\t\tOpenSSL contains integer overflow handling ASN.1 tags (2)\n                http://www.kb.cert.org/vuls/id/380864\n\n                Vulnerability Note VU#686224\n\t\tOpenSSL does not securely handle invalid public key when\n\t\tconfigured to ignore errors\n                http://www.kb.cert.org/vuls/id/686224\n\n                Vulnerability Note VU#732952\n\t\tOpenSSL accepts unsolicited client certificate messages\n                http://www.kb.cert.org/vuls/id/732952\n\n                Vulnerability Note VU#104280\n\t\tMultiple vulnerabilities in SSL/TLS implementations\n                http://www.kb.cert.org/vuls/id/104280\n\n                Vulnerability Note VU#412478\n\t\tOpenSSL 0.9.6k does not properly handle ASN.1 sequences\n                http://www.kb.cert.org/vuls/id/412478\n\n\n    5. These attacks include the\n       installation  of tools for launching distributed denial-of-service\n       (DDoS)   attacks,   providing   generic  proxy  services,  reading\n       sensitive  information  from  the  Windows  registry,  and using a\n       victim   system\u0027s  modem  to  dial  pay-per-minute  services.  The\n       vulnerability  described in VU#865940 exists due to an interaction\n       between  IE\u0027s  MIME  type  processing  and the way it handles HTML\n       application (HTA) files embedded in OBJECT tags. W32/Swen.A Worm\n\n       On  September  19,  the  CERT/CC began receiving a large volume of\n       reports  of  a  mass  mailing  worm,  referred  to  as W32/Swen.A,\n       spreading on the Internet. Similar to W32/Gibe.B in function, this\n       worm  arrives as an attachment claiming to be a Microsoft Internet\n       Explorer  Update  or  a  delivery  failure  notice from qmail. The\n       W32/Swen.A  worm  requires a user to execute the attachment either\n       manually or by using an email client that will open the attachment\n       automatically.  Upon  opening the attachment, the worm attempts to\n       mail  itself  to  all  email addresses it finds on the system. The\n       CERT/CC  updated  the  current  activity  page  to contain further\n       information on this worm. \n\n                Current Activity - September 19, 2003\n                http://www.cert.org/current/archive/2003/09/19/archive.html#swena\n\n\n    7. Buffer Overflow in Sendmail\n\n       Sendmail,  a widely deployed mail transfer agent (MTA), contains a\n       vulnerability  that  could  allow an attacker to execute arbitrary\n       code with the privileges of the sendmail daemon, typically root. \n\n                CERT Advisory CA-2003-25\n\t\tBuffer Overflow in Sendmail\n                http://www.cert.org/advisories/CA-2003-25.html\n\n                Vulnerability Note VU#784980\n\t\tSendmail prescan() buffer overflow vulnerability\n                http://www.kb.cert.org/vuls/id/784980\n\n\n    8. RPCSS Vulnerabilities in Microsoft Windows\n\n       On  September  10,  the  CERT/CC reported on three vulnerabilities\n       that  affect  numerous versions of Microsoft Windows, two of which\n       are  remotely  exploitable  buffer  overflows that may an allow an\n       attacker to execute code with system privileges. \n\n                CERT Advisory CA-2003-23\n\t\tRPCSS Vulnerabilities in Microsoft Windows\n                http://www.cert.org/advisories/CA-2003-23.html\n\n                Vulnerability Note VU#483492\n\t\tMicrosoft Windows RPCSS Service contains heap overflow in\n\t\tDCOM activation routines\n                http://www.kb.cert.org/vuls/id/483492\n\n                Vulnerability Note VU#254236\n\t\tMicrosoft Windows RPCSS Service contains heap overflow in\n\t\tDCOM request filename handling\n                http://www.kb.cert.org/vuls/id/254236\n\n                Vulnerability Note VU#326746\n\t\tMicrosoft Windows RPC service vulnerable to \n\t\tdenial of service\n                http://www.kb.cert.org/vuls/id/326746\n   ______________________________________________________________________\n\nNew CERT Coordination Center (CERT/CC) PGP Key\n\n   On  October 15, the CERT/CC issued a new PGP key, which should be used\n   when sending sensitive information to the CERT/CC. \n\n          CERT/CC PGP Public Key\n          https://www.cert.org/pgp/cert_pgp_key.asc\n\n          Sending Sensitive Information to the CERT/CC\n          https://www.cert.org/contact_cert/encryptmail.html\n   ______________________________________________________________________\n\nWhat\u0027s New and Updated\n\n   Since the last CERT Summary, we have published new and updated\n     * Advisories\n       http://www.cert.org/advisories/\n     * Vulnerability Notes\n       http://www.kb.cert.org/vuls\n     * CERT/CC Statistics\n       http://www.cert.org/stats/cert_stats.html\n     * Congressional Testimony\n       http://www.cert.org/congressional_testimony\n     * Training Schedule\n       http://www.cert.org/training/\n     * CSIRT Development\n       http://www.cert.org/csirts/\n   ______________________________________________________________________\n\n   This document is available from:\n   http://www.cert.org/summaries/CS-2003-04.html\n   ______________________________________________________________________\n\nCERT/CC Contact Information\n\n   Email: cert@cert.org\n          Phone: +1 412-268-7090 (24-hour hotline)\n          Fax: +1 412-268-6989\n          Postal address:\n          CERT Coordination Center\n          Software Engineering Institute\n          Carnegie Mellon University\n          Pittsburgh PA 15213-3890\n          U.S.A. \n\n   CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /\n   EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies\n   during other hours, on U.S. holidays, and on weekends. \n\nUsing encryption\n\n   We  strongly  urge you to encrypt sensitive information sent by email. \n   Our public PGP key is available from\n   http://www.cert.org/CERT_PGP.key\n\n   If  you  prefer  to  use  DES,  please  call the CERT hotline for more\n   information. \n\nGetting security information\n\n   CERT  publications  and  other security information are available from\n   our web site\n   http://www.cert.org/\n\n   To  subscribe  to  the CERT mailing list for advisories and bulletins,\n   send  email  to majordomo@cert.org. Please include in the body of your\n   message\n\n   subscribe cert-advisory\n\n   *  \"CERT\"  and  \"CERT  Coordination Center\" are registered in the U.S. \n   Patent and Trademark Office. \n   ______________________________________________________________________\n\n   NO WARRANTY\n   Any  material furnished by Carnegie Mellon University and the Software\n   Engineering  Institute  is  furnished  on  an  \"as is\" basis. Carnegie\n   Mellon University makes no warranties of any kind, either expressed or\n   implied  as  to  any matter including, but not limited to, warranty of\n   fitness  for  a  particular purpose or merchantability, exclusivity or\n   results  obtained from use of the material. Carnegie Mellon University\n   does  not  make  any warranty of any kind with respect to freedom from\n   patent, trademark, or copyright infringement. \n   ______________________________________________________________________\n\n   Conditions for use, disclaimers, and sponsorship information\n\n   Copyright \\xa92003 Carnegie Mellon University. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 6.5.8\n\niQCVAwUBP8JVOZZ2NNT/dVAVAQGL9wP+I18NJBUBuv7b0pam5La7E7qOQFMn5n78\n7i0gBX/dKgaY5siM6jBYYwCbbA7Y0/Jwtby2zHp1s8RHZY5/3JEzElfv4TLlR8rT\nrb8gJDbpan2JWA6xH9IzqZaSrxrXpNypwU2wWxR2osmbYl8FdV0rD3ZYXJjyi+nU\nUENALuNdthA=\n=DD60\n-----END PGP SIGNATURE-----\n. \n-----BEGIN PGP SIGNED MESSAGE-----\n\nCERT Advisory CA-2003-19 Exploitation of Vulnerabilities in Microsoft RPC\nInterface\n\n   Original issue date: July 31, 2003\n   Last revised: -\n   Source: CERT/CC\n\n   A complete revision history is at the end of this file. \n\nI.  Known  exploits  target  TCP  port  135  and  create a\n   privileged  backdoor  command shell on successfully compromised hosts. \n   Some  versions  of the exploit use TCP port 4444 for the backdoor, and\n   other  versions  use  a  TCP  port number specified by the intruder at\n   run-time.  We  have  also  received  reports  of scanning activity for\n   common  backdoor ports such as 4444/TCP. In some cases, due to the RPC\n   service  terminating,  a  compromised  system  may  reboot  after  the\n   backdoor is accessed by an intruder. Based on\n   current  information,  we  believe  this vulnerability is separate and\n   independent  from  the  RPC  vulnerability  addressed in MS03-026. The\n   CERT/CC  is tracking this additional vulnerability as VU#326746 and is\n   continuing  to work to understand the issue and mitigation strategies. \n\n   In  both  of the attacks described above, a TCP session to port 135 is\n   used  to  execute the attack. However, access to TCP ports 139 and 445\n   may also provide attack vectors and should be considered when applying\n   mitigation strategies. \n\nII. \n\nIII. Solutions\n\nApply patches\n\n   All users are encouraged to apply the patches referred to in Microsoft\n   Security  Bulletin  MS03-026  as soon as possible in order to mitigate\n   the  vulnerability  described  in  VU#568148.  These  patches are also\n   available via Microsoft\u0027s Windows Update service. \n\n   Systems  running  Windows  2000  may still be vulnerable to at least a\n   denial  of  service  attack via VU#326746 if their DCOM RPC service is\n   available  via the network. Therefore, sites are encouraged to use the\n   packet  filtering  tips  below  in  addition  to  applying the patches\n   supplied in MS03-026. \n\nFilter network traffic\n\n   Sites  are  encouraged  to  block network access to the RPC service at\n   network  borders. This can minimize the potential of denial-of-service\n   attacks  originating from outside the perimeter. The specific services\n   that should be blocked include\n     * 135/TCP\n     * 135/UDP\n     * 139/TCP\n     * 139/UDP\n     * 445/TCP\n     * 445/UDP\n\n   If  access  cannot  be  blocked  for  all  external hosts, the CERT/CC\n   recommends  limiting  access  to  only those hosts that require it for\n   normal  operation. As a general rule, the CERT/CC recommends filtering\n   all  types  of  network  traffic  that  are  not  required  for normal\n   operation. \n\n   Because  current exploits for VU#568148 create a backdoor, which is in\n   some  cases  4444/TCP, blocking inbound TCP sessions to ports on which\n   no  legitimate  services  are  provided  may  limit intruder access to\n   compromised hosts. \n\nRecovering from a system compromise\n\n   If  you  believe  a  system under your administrative control has been\n   compromised, please follow the steps outlined in\n\n          Steps for Recovering from a UNIX or NT System Compromise\n\nReporting\n\n   The  CERT/CC is tracking activity related to exploitation of the first\n   vulnerability  (VU#568148)  as CERT#27479 and the second vulnerability\n   (VU#326746)  as CERT#24523. Relevant artifacts or activity can be sent\n   to cert@cert.org with the appropriate CERT# in the subject line. \n\nAppendix A. Vendor Information\n\n   This  appendix  contains information provided by vendors. If a vendor is not listed below, we\n   have not received their comments. \n\nMicrosoft\n\n     Please see Microsoft Security Bulletin MS03-026. \n\nAppendix B",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      },
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "BID",
        "id": "7806"
      },
      {
        "db": "PACKETSTORM",
        "id": "31444"
      },
      {
        "db": "PACKETSTORM",
        "id": "32268"
      },
      {
        "db": "PACKETSTORM",
        "id": "31490"
      }
    ],
    "trust": 6.48
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#679556",
        "trust": 3.2
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "8943",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "7806",
        "trust": 1.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208",
        "trust": 1.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928",
        "trust": 1.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746",
        "trust": 1.0
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284",
        "trust": 1.0
      },
      {
        "db": "CERT/CC",
        "id": "VU#333628",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "10156",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "12970",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#265232",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "31444",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#784980",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#575892",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#254236",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#255484",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#865940",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#467036",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#380864",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#838572",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#422156",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#412478",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#935264",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#686224",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#483492",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#104280",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#567620",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#989932",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#967668",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#435444",
        "trust": 0.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#732952",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "32268",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "31490",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "BID",
        "id": "7806"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "PACKETSTORM",
        "id": "31444"
      },
      {
        "db": "PACKETSTORM",
        "id": "32268"
      },
      {
        "db": "PACKETSTORM",
        "id": "31490"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "id": "VAR-200306-0042",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 1.0
  },
  "last_update_date": "2022-05-08T07:26:52.746000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "MS03-032",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms03-032.asp"
      },
      {
        "title": "MS03-020",
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms03-020.asp"
      },
      {
        "title": "MS03-032",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms03-032.mspx"
      },
      {
        "title": "MS03-020",
        "trust": 0.8,
        "url": "http://www.microsoft.com/japan/technet/security/bulletin/ms03-020.mspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://www.eeye.com/html/research/advisories/ad20030604.html"
      },
      {
        "trust": 2.4,
        "url": "http://www.kb.cert.org/vuls/id/679556"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/7806"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/8943"
      },
      {
        "trust": 1.6,
        "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020"
      },
      {
        "trust": 1.6,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a922"
      },
      {
        "trust": 1.6,
        "url": "http://marc.info/?l=bugtraq\u0026m=105476381609135\u0026w=2"
      },
      {
        "trust": 1.6,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-july/006401.html"
      },
      {
        "trust": 0.9,
        "url": "http://www.eeye.com/html/research/advisories/ad20030723.html"
      },
      {
        "trust": 0.9,
        "url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;819696"
      },
      {
        "trust": 0.8,
        "url": "http://www.openssh.com/txt/buffer.adv"
      },
      {
        "trust": 0.8,
        "url": "http://www.mindrot.org/pipermail/openssh-unix-announce/2003-september/000062.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssh/files/patch-buffer.c"
      },
      {
        "trust": 0.8,
        "url": "http://www.secunia.com/advisories/10156/"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms03-039.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.xfocus.org/advisories/200307/4.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms03-030.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/windows/ie/downloads/critical/818529/default.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/security/security_bulletins/ms03-020.asp"
      },
      {
        "trust": 0.8,
        "url": "http://www.secunia.com/advisories/8943/"
      },
      {
        "trust": 0.8,
        "url": "http://www.lac.co.jp/security/english/snsadv_e/68_e.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.microsoft.com/technet/security/bulletin/ms03-032.asp"
      },
      {
        "trust": 0.8,
        "url": "http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/object.asp"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/12970"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0344"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0344"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-020.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-032.asp"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/334928"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/813208"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/324265"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/323895"
      },
      {
        "trust": 0.3,
        "url": "http://www.cert.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.cert.org/cert_pgp.key"
      },
      {
        "trust": 0.2,
        "url": "http://www.kb.cert.org/vuls/id/561284"
      },
      {
        "trust": 0.2,
        "url": "http://www.kb.cert.org/vuls/id/326746"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/265232"
      },
      {
        "trust": 0.1,
        "url": "http://microsoft.com/technet/security/bulletin/ms03-030.asp"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-18.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/summaries/cs-2003-04.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/412478"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/333628"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/567620"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/104280"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/686224"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/575892"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/732952"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/989932"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/current/archive/2003/09/19/archive.html#swena"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/summaries/"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/stats/cert_stats.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/784980"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/training/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/838572"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/967668"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/current/current_activity.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-28.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-27.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.cert.org/contact_cert/encryptmail.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/incident_notes/in-2003-04.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/435444"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-26.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-24.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-25.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-23.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/935264"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/467036"
      },
      {
        "trust": 0.1,
        "url": "https://www.cert.org/pgp/cert_pgp_key.asc"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/255484"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/current/archive/2003/11/19/archive.html#mimaili"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/865940"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/380864"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/congressional_testimony"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/422156"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/csirts/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/254236"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/id/483492"
      },
      {
        "trust": 0.1,
        "url": "http://www.cert.org/advisories/ca-2003-19.html"
      },
      {
        "trust": 0.1,
        "url": "http://microsoft.com/technet/security/bulletin/ms03-026.asp"
      },
      {
        "trust": 0.1,
        "url": "http://support.microsoft.com?kbid=823980"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "BID",
        "id": "7806"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "PACKETSTORM",
        "id": "31444"
      },
      {
        "db": "PACKETSTORM",
        "id": "32268"
      },
      {
        "db": "PACKETSTORM",
        "id": "31490"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "db": "BID",
        "id": "7806"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "db": "PACKETSTORM",
        "id": "31444"
      },
      {
        "db": "PACKETSTORM",
        "id": "32268"
      },
      {
        "db": "PACKETSTORM",
        "id": "31490"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-16T00:00:00",
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "date": "2003-08-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "date": "2003-07-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "date": "2003-07-24T00:00:00",
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "date": "2003-06-04T00:00:00",
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "date": "2003-08-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "date": "2003-06-04T00:00:00",
        "db": "BID",
        "id": "7806"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "date": "2003-07-28T00:43:46",
        "db": "PACKETSTORM",
        "id": "31444"
      },
      {
        "date": "2003-11-25T05:25:51",
        "db": "PACKETSTORM",
        "id": "32268"
      },
      {
        "date": "2003-08-05T18:53:20",
        "db": "PACKETSTORM",
        "id": "31490"
      },
      {
        "date": "2003-06-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "date": "2003-06-16T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-08-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#333628"
      },
      {
        "date": "2003-09-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#813208"
      },
      {
        "date": "2003-09-10T00:00:00",
        "db": "CERT/CC",
        "id": "VU#326746"
      },
      {
        "date": "2003-07-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#561284"
      },
      {
        "date": "2003-06-04T00:00:00",
        "db": "CERT/CC",
        "id": "VU#679556"
      },
      {
        "date": "2005-08-11T00:00:00",
        "db": "CERT/CC",
        "id": "VU#334928"
      },
      {
        "date": "2009-07-11T22:06:00",
        "db": "BID",
        "id": "7806"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000168"
      },
      {
        "date": "2021-07-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      },
      {
        "date": "2021-07-23T12:55:00",
        "db": "NVD",
        "id": "CVE-2003-0344"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OpenSSH contains buffer management errors",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#333628"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200306-069"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.