Описание
Windows SMB Information Disclosure Vulnerability
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Does this security update target the Server or Client side?
In this case the fix targets both sides. Specifically the smb2.srv binary is the primary fix target, which is housed on both sides of the connection.
How could an attacker exploit this vulnerability?
In a network-based attack, an authenticated attacker would need to open a specific file with captured oplock lease, then perform repeated specific modifications to that file.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows 8.1 for 32-bit systems | ||
Windows 8.1 for x64-based systems | ||
Windows Server 2012 R2 | ||
Windows RT 8.1 | - |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
8.1 High
CVSS3
Связанные уязвимости
, aka 'Windows SMB Information Disclosure Vulnerability'.
Уязвимость реализации сетевого протокола Windows SMB операционных систем Windows, позволяющая нарушителю получить доступ к защищаемой информации
EPSS
8.1 High
CVSS3