Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum3 transaction

2002-08-23T00:00:00
ID VU:311619
Type cert
Reporter CERT
Modified 2002-08-26T00:00:00

Description

Overview

Microsoft Server Message Block (SMB) may crash upon receipt of a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum3 transaction. Attackers can use this vulnerability to cause a denial of service.

Description

SMB is a protocol for sharing data and resources between computers, included in many versions of Microsoft Windows.

SMB may crash if it receives a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum2 transaction. If either the 'Max Param Count' field or 'Max Data Count' field of the packet is set to zero (0), the destination SMB host will crash with a blue screen. This vulnerability can be exploited by both local and remote attackers.


Impact

Remote attackers can cause a denial of service. Attackers may also be able to execute arbitrary code, though this has not been demonstrated or proven.


Solution

Apply a patch

For more information, see:

<http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS02-045.asp>


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Microsoft Corporation| | 15 Jul 2002| 23 Aug 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS02-045.asp>

Credit

Thanks to Ivan Arce of CORE Security Technologies for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: Unknown
  • Date Public: 22 Aug 2002
  • Date First Published: 23 Aug 2002
  • Date Last Updated: 26 Aug 2002
  • Severity Metric: 0.87
  • Document Revision: 9