MS10-006: Vulnerabilities in SMB Client Could Allow Remote Code Execution (978251)

high Nessus Plugin ID 44416


Arbitrary code can be executed on the remote host through its SMB client.


The version of the SMB client software installed on the remote Windows host is affected by two vulnerabilities that could allow arbitrary code execution :

- Improper validation of fields in SMB responses can lead to a pool corruption issue and in turn to arbitrary code execution with SYSTEM level privileges.

- Improper handling of a race condition involving SMB 'Negotiate' responses may allow a remote attacker to execute arbitrary code, cause a denial of service, or escalate his privileges. (CVE-2010-0017)

Note that successful exploitation of either issue requires an attacker to trick a user on the affected host into initiating an SMB connection to a malicious SMB server.


Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: High

ID: 44416

File Name: smb_nt_ms10-006.nasl

Version: 1.26

Type: local

Agent: windows

Published: 2/9/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/9/2010

Vulnerability Publication Date: 2/9/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0016, CVE-2010-0017

BID: 38093, 38100

CWE: 20, 362

MSFT: MS10-006

MSKB: 978251