CVE DATABASE / CVE-2003-0813
CVE-2003-0813
CVSS 5.1 · MEDIUM
Summary
A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.
CVSS 2.0 breakdown
| Base score | 5.1 (MEDIUM) |
| Vector | AV:N/AC:H/Au:N/C:P/I:P/A:P |
| Attack vector | NETWORK |
| Attack complexity | HIGH |
| Confidentiality | PARTIAL |
| Integrity | PARTIAL |
| Availability | PARTIAL |
Weakness type (CWE)
Affected products
Microsoft windows 2000Microsoft windows 98Microsoft windows ntMicrosoft windows server 2003Microsoft windows xp
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html
- http://marc.info/?l=bugtraq&m=106579825211708&w=2
- http://marc.info/?l=bugtraq&m=106588827513795&w=2
- http://marc.info/?l=ntbugtraq&m=106580303918155&w=2
- http://www.kb.cert.org/vuls/id/547820
- http://www.securityfocus.com/bid/8811
- http://www.securitylab.ru/_exploits/rpc2.c.txt
- http://www.us-cert.gov/cas/techalerts/TA04-104A.html
- http://xforce.iss.net/xforce/alerts/id/155
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A893
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A894
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.