Lucene search

K
certCERTVU:652537
HistoryFeb 08, 2005 - 12:00 a.m.

Microsoft Windows SMB packet validation vulnerability

2005-02-0800:00:00
www.kb.cert.org
35

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.5%

Overview

A vulnerability in the way that Microsoft Windows handles some SMB packets could allow remote attackers to execute code of their choosing on a vulnerable system.

Description

The Microsoft Server Message Block (SMB), and its follow-on, Common Internet File System (CIFS), are network protocols that Windows uses to share files, printers, serial ports, and communicate between computers. A vulnerability exists in the way that the affected operating systems validate certain incoming SMB packets. Additional details about the underlying cause of the vulnerability are not known.

An unauthenticated remote attacker may be able to exploit this vulnerability by sending specially-crafted SMB packets to a vulnerable system. Microsoft reports that this vulnerability may also be exploited through a malicious web page. In this scenario, an attacker would need to trick or persuade a user into browsing the malicious web page or following a link to the malicious web page provided in an email message.


Impact

A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system.


Solution

Apply a patch

Microsoft has published MS05-011 in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.


Workarounds

Filter network traffic
Microsoft Security Bulletin MS05-011 also contains recommendations about packet filtering to mitigate this issue. Users, particularly those who are affected but unable to apply the patches, are encouraged to implement these workarounds.


Vendor Information

652537

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: February 08, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Microsoft has published MS05-011in response to this issue. Users are strongly encouraged to review this bulletin and apply the patches it refers to.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23652537 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Microsoft Security for reporting this vulnerability. Microsoft, in turn, credits eEye Digital Security with reporting this vulnerability to them.

This document was written by Chad R Dougherty, based upon information provided by Microsoft.

Other Information

CVE IDs: CVE-2005-0045
Severity Metric: 27.09 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.5%