Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0366
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Buffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows 2000远程访问服务本地缓冲区溢出漏洞(MS02-029)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows系统中包含远程访问服务(RAS)允许计算机利用拨号连接访问远端网络。 Microsoft Windows中的RAS服务实现上存在漏洞,可导致本地攻击者进行缓冲区溢出攻击。 Microsoft Windows RAS服务的rasphone.pbk文件存放了拨号属性如拨号号码、安全及网络设置等用于连接远端网络的信息。RAS的实现对rasphone.pbk文件中条目解释处理存在缓冲区溢出漏洞,可导致本地攻击者利用特殊超长的条目进行缓冲区溢出,以SYSTEM的权限在目标系统中执行
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0366
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0366
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-0366

No comments yet


Leave a comment