{"vuid":"VU#753212","idnumber":"753212","name":"Microsoft LSA Service contains buffer overflow in DsRolepInitializeLog() function","keywords":["Microsoft","LSA Service","LSASS","DCPROMO.LOG","LSASRV.DLL","DsRolepInitializeLog()","AD20040413C","sasser"],"overview":"The Windows Local Security Authority Service Server (LSASS) contains a vulnerability that may permit an attacker to completely compromise the system.","clean_desc":"A buffer overflow vulnerability exists in a Microsoft Active Directory service logging function that is exposed by the LSASS DCE/RPC interface. The vulnerability occurs due to the misuse of a vsprintf() call. For a full technical description, please see eEye Digital Security's Advisiory. This vulnerability affects the following systems: Windows 2000\nWindows XP\nWindows Server 2003 - Microsoft notes that while the vulnerability exists in Window Server 2003, it could only be expoited by a local administrator.","impact":"A remote unauthenticated attacker could exploit this vulnerability to execute arbitrary code on the vulnerable system.","resolution":"Apply a patch from the vendor Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.","workarounds":"","sysaffected":"","thanks":"The Microsoft Security Bulletin credits eEye Digital Security for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx","http://www.eeye.com/html/Research/Advisories/AD20040413C.html"],"cveids":["CVE-2003-0533"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-13T19:14:36Z","publicdate":"2004-04-13T00:00:00Z","datefirstpublished":"2004-04-14T01:25:18Z","dateupdated":"2004-04-14T01:31:24Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"35.4375","cam_scorecurrentwidelyknown":"41.34375","cam_scorecurrentwidelyknownexploited":"64.96875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":35.4375,"vulnote":null}