CVE-2004-0193

N/A Unknown
Published: March 15, 2004 Modified: April 16, 2026
View on NVD

Description

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/150326
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.osvdb.org/4072
Source: cve@mitre.org
http://xforce.iss.net/xforce/alerts/id/165
Source: cve@mitre.org
Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=107789851117176&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/10988
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.eeye.com/html/Research/Advisories/AD20040226.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.eeye.com/html/Research/Upcoming/20040213.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.kb.cert.org/vuls/id/150326
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.osvdb.org/4072
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/9752
Source: af854a3a-2127-422b-91ae-364da2661108
http://xforce.iss.net/xforce/alerts/id/165
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15207
Source: af854a3a-2127-422b-91ae-364da2661108

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
28.4%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

iss