This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote host through the
installed SMB client.
The version of the SMB client software installed on the remote
Windows host may be affected by one or more vulnerabilities,
including some that could allow arbitrary code execution :
- Incorrect handling of incomplete SMB responses could
be abused to cause the system to stop responding.
- A vulnerability in the way the SMB client allocates
memory when parsing specially crafted SMB responses
could be abused by an unauthenticated, remote attacker
to execute arbitrary code with system-level privileges.
- Improper validation of fields in SMB responses could
lead to a memory corruption issue and in turn to
arbitrary code execution with system-level privileges.
- Improper parsing of SMB transaction responses could
lead to a memory corruption issue resulting in code
execution with system-level privileges. (CVE-2010-0476)
- Improper handling of SMB responses could cause the SMB
client to consume the entire response and indicate an
invalid value to the Winsock kernel, which in turn
could allow remote code execution and result in the
compromise of the affected system. (CVE-2010-0477)
See also :
Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista, 2008, 7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 45507 ()
Bugtraq ID: 3698939312393363933939340
CVE ID: CVE-2009-3676CVE-2010-0269CVE-2010-0270CVE-2010-0476CVE-2010-0477
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.