Microsoft Windows SMBv1 SMB_COM_NT_TRANSACT Total Data Count Buffer Overflow

Strike ID:
E19-0bds1
CVSS:
8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2017

Description

This strike recreates a buffer overflow attack in Microsoft Windows SMBv1 service. The vulnerability is due to insufficient sanitization of user-supplied input while processing SMB_COM_NT_TRANSACT requests. A remote, unauthenticated attacker could exploit this vulnerability via a specially-crafted SMB packet, containing a bad value for 'SizeOfListInBytes' for the specified SMB package type. Successful exploitation leads to arbitrary code execution on the target system. * NOTE: This vulnerability was targeted with ShadowBrokers EternalBlue exploit.

CVE

References