Unrated severityNVD Advisory· Published Feb 7, 2003· Updated Apr 16, 2026
CVE-2003-0003
CVE-2003-0003
Description
Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.
Affected products
45cpe:2.3:a:microsoft:windows_2000_terminal_services:-:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:microsoft:windows_2000_terminal_services:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000_terminal_services:-:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*+ 31 more
- cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:*:64-bit:*:*:*:*:*+ 4 more
- cpe:2.3:o:microsoft:windows_xp:-:*:64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:-:sp1:64-bit:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.cert.org/advisories/CA-2003-03.htmlnvdPatchThird Party AdvisoryUS Government Resource
- www.kb.cert.org/vuls/id/610986nvdPatchThird Party AdvisoryUS Government Resource
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- www.securityfocus.com/bid/6666nvdThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/11132nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A103nvdThird Party Advisory
- docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-001nvd
News mentions
0No linked articles in our index yet.