Search for vulnerabilities
Vulnerability ID | VCID-537x-qtja-aaaf |
Aliases |
CVE-2003-0201
|
Summary | Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | April 7, 2003 |
Description | Samba 2.2.x - 'call_trans2open' Remote Buffer Overflow (4) |
Ransomware campaign use | Known |
Source publication date | April 7, 2003 |
Exploit type | remote |
Platform | unix |
Source update date | Nov. 12, 2012 |
Source URL | https://www.securityfocus.com/bid/7294/info |
Data source | Metasploit |
---|---|
Description | This exploits the buffer overflow found in Samba versions 2.2.0 to 2.2.8. This particular module is capable of exploiting the flaw on Solaris SPARC systems that do not have the noexec stack option set. Big thanks to MC and valsmith for resolving a problem with the beta version of this module. |
Note | AKA: - ECHOWRECKER Stability: - crash-service-restarts Reliability: - repeatable-session SideEffects: - ioc-in-logs |
Ransomware campaign use | Unknown |
Source publication date | April 7, 2003 |
Platform | Solaris |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/solaris/samba/trans2open.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.98606 |
EPSS Score | 0.71226 |
Published At | May 10, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |