Search for vulnerabilities
| Vulnerability ID | VCID-72dp-w9m7-2uar |
| Aliases |
CVE-2003-0201
|
| Summary | |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 0.8 |
| Risk | 1.6 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| Data source | Metasploit |
|---|---|
| Description | This exploits the buffer overflow found in Samba versions 2.2.0 to 2.2.8. This particular module is capable of exploiting the flaw on Solaris SPARC systems that do not have the noexec stack option set. Big thanks to MC and valsmith for resolving a problem with the beta version of this module. |
| Note | AKA: - ECHOWRECKER Stability: - crash-service-restarts Reliability: - repeatable-session SideEffects: - ioc-in-logs |
| Ransomware campaign use | Unknown |
| Source publication date | April 7, 2003 |
| Platform | Solaris |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/solaris/samba/trans2open.rb |
| Data source | Exploit-DB |
|---|---|
| Date added | April 7, 2003 |
| Description | Samba 2.2.x - 'call_trans2open' Remote Buffer Overflow (4) |
| Ransomware campaign use | Known |
| Source publication date | April 7, 2003 |
| Exploit type | remote |
| Platform | unix |
| Source update date | Nov. 12, 2012 |
| Source URL | https://www.securityfocus.com/bid/7294/info |
| Percentile | 0.98906 |
| EPSS Score | 0.76919 |
| Published At | July 30, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T11:29:23.296272+00:00 | EPSS Importer | Import | https://epss.cyentia.com/epss_scores-current.csv.gz | 37.0.0 |