cve/2003/CVE-2003-0352.md

31 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2003-0352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0352)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
2024-05-27 13:12:02 +00:00
- https://github.com/Cruxer8Mech/Idk
2025-09-29 21:09:30 +02:00
- https://github.com/Naniprabhas07/nmap
2024-05-26 14:27:05 +02:00
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit
- https://github.com/nitishbadole/oscp-note-2
- https://github.com/rmsbpro/rmsbpro
2025-09-29 21:09:30 +02:00
- https://github.com/siri7997/task1
- https://github.com/willamygarcia/Vuln_Windows_7_11
2024-05-26 14:27:05 +02:00
- https://github.com/ycdxsb/WindowsPrivilegeEscalation