Lucene search

K

Microsoft Windows Server Message Block 3.1.1 RCE Vulnerability (KB4551762)

๐Ÿ—“๏ธย 12 Mar 2020ย 00:00:00Reported byย Copyright (C) 2020 Greenbone Networks GmbHTypeย 
openvas
ย openvas
๐Ÿ”—ย plugins.openvas.org๐Ÿ‘ย 101ย Views

Microsoft Windows Server Message Block 3.1.1 Remote Code Executio

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
myhack58
Odd security letter issued to Microsoft a high-risk vulnerability warning Win10 as the main effect of the target-vulnerability warning-the black bar safety net
14 Mar 202000:00
โ€“myhack58
exploitpack
Microsoft Windows 10 (19031909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Local Privilege Escalation
30 Mar 202000:00
โ€“exploitpack
exploitpack
Microsoft Windows 10 (19031909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow (PoC)
14 Mar 202000:00
โ€“exploitpack
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
12 May 202014:41
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
4 Sep 202115:07
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
20 Nov 202009:00
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
22 Apr 202009:10
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
30 Mar 202011:42
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
6 Apr 202015:16
โ€“githubexploit
GithubExploit
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft
9 Oct 202108:19
โ€“githubexploit
Rows per page
# Copyright (C) 2020 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the rsleferenced
# advisory, and are Copyright (C) the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.816800");
  script_version("2022-08-09T10:11:17+0000");
  script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
  script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
  script_cve_id("CVE-2020-0796");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2022-08-09 10:11:17 +0000 (Tue, 09 Aug 2022)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-06-11 19:15:00 +0000 (Thu, 11 Jun 2020)");
  script_tag(name:"creation_date", value:"2020-03-12 13:00:37 +0000 (Thu, 12 Mar 2020)");
  script_name("Microsoft Windows Server Message Block 3.1.1 RCE Vulnerability (KB4551762)");

  script_tag(name:"summary", value:"This host is missing a critical security
  update according to Microsoft KB4551762");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The vulnerability is due to an error when the
  SMBv3 handles maliciously crafted compressed data packets. Both SMB Servers and
  clients are affected. To exploit the vulnerability against an SMB Server, an
  unauthenticated attacker could send a specially crafted packet to a targeted SMBv3
  Server. While as to exploit the vulnerability against an SMB Client, an
  unauthenticated attacker would need to configure a malicious SMBv3 Server and
  convince a user to connect to it.");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker
  to execute code on the target SMB Server or SMB Client.");

  script_tag(name:"affected", value:"SMB 3.1.1(SMBv3) on

  - Windows 10 Version 1903 for 32-bit/x64-based Systems

  - Windows 10 Version 1909 for 32-bit/x64-based Systems");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");

  script_xref(name:"URL", value:"https://support.microsoft.com/en-gb/help/4551762/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("smb_reg_service_pack.nasl");
  script_require_ports(139, 445);
  script_mandatory_keys("SMB/WindowsVersion");
  exit(0);
}

include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp(win10:1, win10x64:1) <= 0){
  exit(0);
}

sysPath = smb_get_system32root();
if(!sysPath ){
  exit(0);
}

fileVer = fetch_file_version(sysPath:sysPath, file_name:"Gdiplus.dll");
if(!fileVer){
  exit(0);
}

if(version_in_range(version:fileVer, test_version:"10.0.18362.0", test_version2:"10.0.18362.719"))
{
  report = report_fixed_ver(file_checked:sysPath + "\Gdiplus.dll",
                            file_version:fileVer, vulnerable_range:"10.0.18362.0 - 10.0.18362.719");
  security_message(data:report);
  exit(0);
}
exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Mar 2020 00:00Current
9High risk
Vulners AI Score9
CVSS27.5
CVSS310
EPSS0.94419
101
.json
Report