Strike ID:
E19-0bds1
CVSS:
9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
False Positive:
t
Variants:
1
Year:
2017

Description

This strike recreates a buffer overflow attack in Microsoft Windows SMBv1 service. The vulnerability is due to insufficient sanitization of user-supplied input while processing SMB COM NT TRANSACT requests. A remote, unauthenticated attacker could exploit this vulnerability via a specially-crafted SMB packet, containing a bad value for SizeOfListInBytes for the specified SMB package type. Successful exploitation leads to arbitrary code execution on the target system. * NOTE: This vulnerability was targeted with ShadowBrokers EternalBlue exploit.

CVE

References

MSB

BID

ExploitDB

Secunia

Security Tracker

Metasploit

ZDI

Google

OSVDB

{}