|
|||
Rule General Information |
---|
Release Date: | 2018-11-26 | |
Rule Name: | PROTOCOL-SMB Microsoft Windows SMB Tree Connect Response Denial of Service Vulnerability (CVE-2017-0016) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Microsoft Windows 10 Gold, 1511, and 1607; Windows 8.1; Windows RT 8.1; Windows Server 2012 R2, and Windows Server 2016 do not properly handle certain requests in SMBv2 and SMBv3 packets, which allows remote attackers to execute arbitrary code via a crafted SMBv2 or SMBv3 packet to the Server service, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability." | |
Impact: | An attacker can launch a denial of service attack by exploiting the vulnerability successfully. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:95969 SecurityTrackerID:1037767 SecurityTrackerID:1038001 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0016 |
|
Solutions |
---|
Applying the patch MS17-012 is able to eliminate this problem. The bugfix is ready for download at https://www.microsoft.com/en-us/msrc?rtc=1 |