{
	"id": "9d5eef5c-6ef3-46ae-9345-007c43db7ab6",
	"created_at": "2026-04-06T00:11:20.920971Z",
	"updated_at": "2026-04-10T13:12:01.676029Z",
	"deleted_at": null,
	"sha1_hash": "440453146c5688343d2ba801647d0e63534f8f0b",
	"title": "NVD - CVE-2017-0176",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 62463,
	"plain_text": "NVD - CVE-2017-0176\r\nArchived: 2026-04-05 21:54:54 UTC\r\nDescription\r\nA buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and\r\nServer 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that\r\nthe computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal\r\nServices) enabled.\r\nMetrics\r\n \r\nNVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other\r\nsources is also displayed.\r\nCVSS 3.x Severity and Vector Strings:\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-0176\r\nPage 1 of 4\n\nNIST: NVD\r\nVector:  CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\r\nReferences to Advisories, Solutions, and Tools\r\nBy selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites\r\nbecause they may have information that would be of interest to you. No inferences should be drawn on account of\r\nother sites being referenced, or not, from this page. There may be other web sites that are more appropriate for\r\nyour purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these\r\nsites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please\r\naddress comments about this page to nvd@nist.gov.\r\nURL Source(s) Tag(s)\r\nhttp://www.securityfocus.com/bid/98550\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nThird Party\r\nAdvisory \r\nVDB Entry \r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-0176\r\nPage 2 of 4\n\nURL Source(s) Tag(s)\r\nhttp://www.securityfocus.com/bid/98752\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nThird Party\r\nAdvisory \r\nVDB Entry \r\nhttps://blog.0patch.com/2017/06/a-quick-analysis-of-microsofts.html\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nhttps://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nExploit  Third\r\nParty\r\nAdvisory \r\nhttps://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nPatch  Vendor\r\nAdvisory \r\nhttps://support.microsoft.com/en-us/help/4022747/security-update-for-windows-xp-and-windows-server-2003\r\nCVE,\r\nMicrosoft\r\nCorporation\r\nPatch  Vendor\r\nAdvisory \r\nWeakness Enumeration\r\nCWE-ID CWE Name Source\r\nCWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\r\nNIST  \r\nKnown Affected Software Configurations Switch to CPE 2.2\r\nConfiguration 1 ( hide )\r\n cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\n cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\n cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\n cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-0176\r\nPage 3 of 4\n\ncpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\n cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*\r\n   Show Matching CPE(s)\r\nDenotes Vulnerable Software\r\nAre we missing a CPE here? Please let us know.\r\nChange History\r\n9 change records found show changes\r\nSource: https://nvd.nist.gov/vuln/detail/CVE-2017-0176\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-0176\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://nvd.nist.gov/vuln/detail/CVE-2017-0176"
	],
	"report_names": [
		"CVE-2017-0176"
	],
	"threat_actors": [],
	"ts_created_at": 1775434280,
	"ts_updated_at": 1775826721,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/440453146c5688343d2ba801647d0e63534f8f0b.pdf",
		"text": "https://archive.orkl.eu/440453146c5688343d2ba801647d0e63534f8f0b.txt",
		"img": "https://archive.orkl.eu/440453146c5688343d2ba801647d0e63534f8f0b.jpg"
	}
}