Lucene search

K
saintSAINT CorporationSAINT:30D79D30A079078FDE7DB3C5C56D3681
HistorySep 20, 2010 - 12:00 a.m.

Windows SMB2 buffer overflow

2010-09-2000:00:00
SAINT Corporation
my.saintcorporation.com
77

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

Added: 09/20/2010
CVE: CVE-2009-3103
BID: 36299
OSVDB: 57799

Background

SMB2 is the replacement protocol for the SMB Windows filesharing protocol.

Problem

A buffer overflow vulnerability in the SMB2 Service allows remote attackers to execute arbitrary commands.

Resolution

Apply the patch referenced in Microsoft Security Bulletin 09-050.

References

<http://www.microsoft.com/technet/security/bulletin/ms09-050.mspx&gt;

Limitations

Exploit works on Windows Vista SP1 and SP2. Exploitation attempts while other SMB2 activity is taking place may cause target system to reboot.

Platforms

Windows Vista

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%