Microsoft Windows NT 4.0/2000 SMB SMB_COM_TRANSACTION Packet memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.7 | $0-$5k | 0.00 |
Summary
A vulnerability described as critical has been identified in Microsoft Windows NT 4.0/2000. The affected element is an unknown function of the component SMB Handler. Executing a manipulation as part of SMB_COM_TRANSACTION Packet can lead to memory corruption. This vulnerability is tracked as CVE-2002-0724. The attack can be launched remotely. Moreover, an exploit is present. Upgrading the affected component is recommended.
Details
A vulnerability was found in Microsoft Windows NT 4.0/2000 (Operating System). It has been declared as critical. This vulnerability affects an unknown code block of the component SMB Handler. The manipulation as part of a SMB_COM_TRANSACTION Packet leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
The weakness was disclosed 09/24/2002 as confirmed advisory (CERT.org). The advisory is shared for download at kb.cert.org. This vulnerability was named CVE-2002-0724. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are unknown but a public exploit is available.
It is possible to download the exploit at exploit-db.com. It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 11300 (MS02-045: Unchecked buffer in Network Share Provider (326830)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows : Microsoft Bulletins and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 70023 (Microsoft Network Share Provider SMB Request Buffer Overflow Vulnerability (MS02-045)).
Upgrading eliminates this vulnerability. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Attack attempts may be identified with Snort ID 2101. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 1365.
The vulnerability is also documented in the databases at X-Force (9933), Exploit-DB (21746), Tenable (11300), SecurityFocus (BID 5556†) and Vulnerability Center (SBV-902†). Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.7
VulDB Base Score: 7.5
VulDB Temp Score: 6.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 11300
Nessus Name: MS02-045: Unchecked buffer in Network Share Provider (326830)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Snort ID: 2101
Snort Message: OS-WINDOWS SMB Trans Max Param/Count OS-WINDOWS attempt
Snort Class: 🔍
Suricata ID: 2102102
Suricata Class: 🔍
Suricata Message: 🔍
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
SourceFire IPS: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Timeline
08/22/2002 🔍08/22/2002 🔍
09/24/2002 🔍
09/24/2002 🔍
02/08/2003 🔍
02/28/2003 🔍
07/23/2014 🔍
09/14/2025 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: kb.cert.org
Status: Confirmed
CVE: CVE-2002-0724 (🔍)
GCVE (CVE): GCVE-0-2002-0724
GCVE (VulDB): GCVE-100-18772
OVAL: 🔍
CERT: 🔍
X-Force: 9933
SecurityFocus: 5556
Vulnerability Center: 902 - [MS02-045] DoS in Microsoft via SMB Request to Network Share Provider, High
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 07/23/2014 10:59Updated: 09/14/2025 12:43
Changes: 07/23/2014 10:59 (60), 09/17/2018 07:08 (18), 12/31/2024 01:23 (16), 04/24/2025 22:11 (11), 09/14/2025 12:43 (2)
Complete: 🔍
Cache ID: 216:4A6:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.