Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2013-0003

CVE information

Published

11 years ago

Last Modified

3 months ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability.".

CVSSv2.0 Score

Severity
High
Base Score
9.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:
  No
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
  No
-
cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:
  No
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
  No
-
cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*
  No
-
cpe:2.3:a:microsoft:.net_framework:4.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  No
-