First published: Thu Sep 04 2003(Updated: )
The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =enterprise_64-bit | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows 2000 | =sp3 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows XP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0661 is considered a high severity vulnerability due to its potential to allow remote attackers to access sensitive information.
To fix CVE-2003-0661, apply the appropriate security patches provided by Microsoft for the affected versions of Windows.
CVE-2003-0661 affects Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003.
CVE-2003-0661 may allow remote attackers to obtain random memory contents from the affected system.
While the best practice is to apply the official patch, disable the NetBT Name Service if it is not needed as a temporary workaround for CVE-2003-0661.