Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6p79-qp56-xj76

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."

The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."

EPSS

Процентиль: 96%
0.22755
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 16 лет назад

The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."

EPSS

Процентиль: 96%
0.22755
Средний

Дефекты

CWE-20