CVE-2004-0193

Severity

75%

Complexity

99%

Confidentiality

106%

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

Type

Internet Security Systems

First reported 21 years ago

2004-03-15 05:00:00

Last updated 7 years ago

2017-10-10 01:30:00

Affected Software

Internet Security Systems BlackICE Agent Server 3.6eca

3.6eca

Internet Security Systems BlackICE PC Protection 3.6cbd

3.6cbd

Internet Security Systems BlackICE Server Protection 3.6cbz

3.6cbz

Internet Security Systems RealSecure Desktop 3.6eca

3.6eca

Internet Security Systems RealSecure Desktop 3.6ecf

3.6ecf

Internet Security Systems RealSecure Desktop 7.0ebg

7.0ebg

Internet Security Systems RealSecure Desktop 7.0epk

7.0epk

Internet Security Systems RealSecure Guard 3.6ecb

3.6ecb

Internet Security Systems RealSecure Sentry 3.6ecf

3.6ecf

Internet Security Systems Proventia A Series XPU 20.15

20.15

Internet Security Systems Proventia G Series XPU 22.3

22.3

Internet Security Systems Proventia M Series XPU 1.3

1.30

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.