Описание
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-3103
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53090
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6489
- http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0090.html
- http://blog.48bits.com/?p=510
- http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html
- http://isc.sans.org/diary.html?storyid=7093
- http://osvdb.org/57799
- http://secunia.com/advisories/36623
- http://www.exploit-db.com/exploits/9594
- http://www.kb.cert.org/vuls/id/135940
- http://www.microsoft.com/technet/security/advisory/975497.mspx
- http://www.reversemode.com/index.php?option=com_content&task=view&id=64&Itemid=1
- http://www.securityfocus.com/archive/1/506300/100/0/threaded
- http://www.securityfocus.com/archive/1/506327/100/0/threaded
- http://www.securityfocus.com/bid/36299
- http://www.securitytracker.com/id?1022848
- http://www.us-cert.gov/cas/techalerts/TA09-286A.html
EPSS
CVE ID
Связанные уязвимости
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
Уязвимость компонента SMBv2 операционной системы Windows, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
EPSS