Vulnerability Note VU#135940
Windows SMB version 2 vulnerability
Overview
Microsoft Windows Vista and Server 2008 do not correctly parse SMB version 2 messages.This vulnerability could allow an attacker to execute arbitrary code.
Description
The Server Message Block version 2 (SMBv2) protocol is the successor to the original SMB protocol. SMBv2 is available in Windows Vista, Server 2008 and Windows 7 release candidates. Windows Vista and Server 2008 fail to properly process fails to properly parse the headers for the Negotiate Protocol Request portion of an SMBv2 message. |
Impact
An attacker may be able to execute arbitrary code or cause a vulnerable system to crash. |
Solution
There is currently no solution to this problem. Until patches are available, users and administrators are encouraged to review the below workarounds. |
|
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Microsoft Corporation | Affected | - | 10 Sep 2009 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.microsoft.com/technet/security/advisory/975497.mspx
- http://technet.microsoft.com/en-us/library/dd734783(WS.10).aspx
- http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html
Credit
Thanks to Microsoft and Laurent Gaffié for information that was used in this report.
This document was written by Ryan Giobbi.
Other Information
- CVE IDs: CVE-2009-3103
- Date Public: 07 Sep 2009
- Date First Published: 10 Sep 2009
- Date Last Updated: 16 Sep 2009
- Severity Metric: 62.70
- Document Revision: 16
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.