First published: Mon Mar 15 2004(Updated: )
Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Iss Realsecure Desktop | =7.0ebg | |
ISS RealSecure | =3.6ecb | |
ISS RealSecure Sentry | =3.6ecf | |
ISS RealSecure | =7.0-xpu20.16 | |
Iss Realsecure Desktop | =3.6ecf | |
IBM ISS BlackICE PC Protection | =3.6cbd | |
IBM ISS BlackICE Agent Server | =3.6eca | |
ISS RealSecure Network | =7.0-xpu_20.15 | |
ISS BlackICE Server Protection | =3.6cbz | |
Iss Realsecure Desktop | =3.6eca | |
Iss Realsecure Desktop | =7.0epk | |
IBM Proventia G Series XPU | =22.3 | |
IBM Proventia M Series Xpu | =1.30 | |
IBM Proventia A Series XPU | =20.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0193 has a high severity due to the potential for remote code execution through heap-based buffer overflow.
To fix CVE-2004-0193, ensure you apply the latest security patches for the affected ISS products.
CVE-2004-0193 affects various versions of ISS RealSecure and BlackICE products, including 7.0 and 3.6.
The exploit type for CVE-2004-0193 is a heap-based buffer overflow.
Yes, CVE-2004-0193 can be exploited remotely, allowing attackers to execute arbitrary code.