CVE-2003-0352

EXPLOITED

Microsoft Windows - Buffer Overflow

Title source: llm

Description

Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16749
exploitdb WORKING POC VERIFIED
by ey4s · cremotewindows
https://www.exploit-db.com/exploits/100
exploitdb WRITEUP VERIFIED
by [email protected] · textremotewindows
https://www.exploit-db.com/exploits/22917
metasploit WORKING POC GREAT
by hdm, spoonm, cazz · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/dcerpc/ms03_026_dcom.rb

Scores

EPSS 0.9057
EPSS Percentile 99.6%

Details

VulnCheck KEV 2007-09-07
Status published
Products (8)
microsoft/windows_2000 (5 CPE variants)
microsoft/windows_2003_server enterprise
microsoft/windows_2003_server enterprise_64-bit
microsoft/windows_2003_server r2 (2 CPE variants)
microsoft/windows_2003_server standard
microsoft/windows_2003_server web
microsoft/windows_nt 4.0 (32 CPE variants)
microsoft/windows_xp (5 CPE variants)
Published Aug 18, 2003
Tracked Since Feb 18, 2026