E19-0bds1
CVSS:
8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2017
Description
This strike recreates a buffer overflow attack in Microsoft Windows SMBv1 service.
The vulnerability is due to insufficient sanitization of user-supplied input while processing SMB_COM_NT_TRANSACT requests.
A remote, unauthenticated attacker could exploit this vulnerability via a specially-crafted SMB packet, containing a bad value for 'SizeOfListInBytes' for the specified SMB package type.
Successful exploitation leads to arbitrary code execution on the target system.
* NOTE: This vulnerability was targeted with ShadowBrokers EternalBlue exploit.