8.4 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.898 High
EPSS
Percentile
98.7%
SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via malformed values of unspecified βfields inside the SMB packetsβ in an NT Trans2 request, related to βinsufficiently validating the buffer size,β aka βSMB Validation Remote Code Execution Vulnerability.β
www.securityfocus.com/archive/1/500013/100/0/threaded
www.securityfocus.com/bid/33122
www.securitytracker.com/id?1021560
www.us-cert.gov/cas/techalerts/TA09-013A.html
www.vupen.com/english/advisories/2009/0116
www.zerodayinitiative.com/advisories/ZDI-09-002/
docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-001
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5248