CVE-2003-0813

N/A Unknown
Published: November 17, 2003 Modified: April 16, 2026
View on NVD

Description

A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=106579825211708&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=106588827513795&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=ntbugtraq&m=106580303918155&w=2
Source: cve@mitre.org
Third Party Advisory
http://www.kb.cert.org/vuls/id/547820
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/8811
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securitylab.ru/_exploits/rpc2.c.txt
Source: cve@mitre.org
Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-104A.html
Source: cve@mitre.org
Broken Link Third Party Advisory US Government Resource
http://xforce.iss.net/xforce/alerts/id/155
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://marc.info/?l=bugtraq&m=106579825211708&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=106588827513795&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=ntbugtraq&m=106580303918155&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/547820
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/8811
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitylab.ru/_exploits/rpc2.c.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-104A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory US Government Resource
http://xforce.iss.net/xforce/alerts/id/155
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
53.4%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft