|
|||
Rule General Information |
---|
Release Date: | 2017-04-18 | |
Rule Name: | PROTOCOL-SMB Microsoft Windows SMB Server Smbv1 Buffer Overflow Vulnerability -1 (CVE-2017-0143) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:96705 SecurityTrackerID:1037991 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: https://technet.microsoft.com/library/security/MS17-010 |