|
|||
Rule General Information |
---|
Release Date: | 2018-07-16 | |
Rule Name: | Microsoft Windows SMB Server Smbv1 Memory Corruption Vulnerability -1 (CVE-2017-0143) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." | |
Impact: | An attacker can execute arbitrary code in the context of the vulnerable system. Failed exploit may cause denial-of-service attack. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:96703 SecurityTrackerID:1037991 https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0143 ExploitDB:41891 ExploitDB:41987 ExploitDB:43970 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: https://technet.microsoft.com/library/security/MS17-010 |