Vulnerability Note VU#342243
Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetShareEnum transaction
Microsoft Server Message Block (SMB) is a protocol for sharing data and resources between computers. SMB may crash upon receipt of a crafted SMB_COM_TRANSACTION packet requesting a NetShareEnum transaction. Attackers can use this vulnerability to cause a denial of service. SMB is included in many versions of Microsoft Windows.
SMB will crash if it receives a crafted SMB_COM_TRANSACTION packet requesting a NetShareEnum transaction, with field "Max Param Count" or "Max Data Count" set to zero (0). On exploitation, the crashed host condition exhibits a blue screen. This vulnerability can be exploited by an attacker with access to a user account on the target system. By default, anonymous users have the required access to exploit this vulnerability; therefore on most Windows systems an attacker does not need to be authenticated.
Attackers can cause a denial of service. Attackers might also be able to execute arbitrary code, though this has not been demonstrated or proven.
Apply a patch
For more information about patches, see
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||15 Jul 2002||23 Aug 2002|
CVSS Metrics (Learn More)
Thanks to Ivan Arce of CORE Security Technologies for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
- CVE IDs: CAN-2002-0724
- Date Public: 22 Aug 2002
- Date First Published: 23 Aug 2002
- Date Last Updated: 02 Jul 2003
- Severity Metric: 5.02
- Document Revision: 16
If you have feedback, comments, or additional information about this vulnerability, please send us email.