CVE-2002-0724
Published Sep 24, 2002
Last updated 6 years ago
Overview
- Description
- Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35346A7B-2CB5-446D-B0C3-1F21D71A746D" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "416F06DD-980E-4A54-822D-CBA499FD1F86" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A08D0EA1-DA1B-4C52-883A-3F156F032517" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02BE9817-E1AE-4619-8302-CA7AA4167F48" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDDD8DA8-D074-4543-AEDF-F856B5567F21" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FECD4B0-23A0-4C0B-9888-D28A5941D848" }, { "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "580B0C9B-DD85-40FA-9D37-BAC0C96D57FC" } ], "operator": "OR" } ] } ]