Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2017-0176
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- High
- Base Score
- 8.1/10
- Exploit Score
- 2.2/10
- Access Vector
- Network
- Access Complexity
- High
- Privileges Required
- None
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-
- https://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit
- http://www.securityfocus.com/bid/98550
- https://support.microsoft.com/en-us/help/4022747/security-update-for-windows-xp-and-wind
- http://www.securityfocus.com/bid/98752
- https://blog.0patch.com/2017/06/a-quick-analysis-of-microsofts.html