Microsoft Server Message Block (SMB) may crash when it receives a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum2 transaction. Attackers can use this vulnerability to cause a denial of service.
SMB is a protocol for sharing data and resources between computers. It is included in many versions of Microsoft Windows.
SMB will crash if it receives a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum2 transaction. If either the 'Max Param Count' field or the 'Max Data Count' field of the packet is set to zero (0), the destination SMB host will crash with a blue screen. This vulnerability can be exploited by both local and remote attackers.
Remote attackers can cause a denial of service. Attackers may also be able to execute arbitrary code, though this has not been demonstrated or proven.
Apply a patch
Thanks to Ivan Arce for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
|Date First Published:||2002-08-23|
|Date Last Updated:||2003-08-19 21:12 UTC|