SMB: DLL File Transfer
This signature detects Microsoft Windows Dynamically Link Libraries (DLL's) transferred via the Server Message Block (SMB) protocol. Vulnerabilities in Microsoft Windows allow an attacker to reference a malicious remote DLL file (using an SMB URI) through a Web page that when the page is accessed overwrites a local DLL, resulting in arbitrary code execution.
Extended Description
Microsoft Windows is prone to an arbitrary-code-execution vulnerability that affects the Data Access Component. Attackers can exploit this vulnerability to execute arbitrary code in the context of the user running the vulnerable application.
Affected Products
Avaya messaging_application_server,Avaya communication_server_1000_telephony_manager
References
BugTraq: 49026 52036 49353 53011 42654 65745 52375
CVE: CVE-2015-6132
URL: https://www.microsoft.com/technet/security/advisory/2269637.mspx https://technet.microsoft.com/en-us/library/security/ms15-132 https://www.securify.nl/advisory/sfy20150801/com__services_dll_side_loading_vulnerability.html http://technet.microsoft.com/en-us/security/bulletin/ms12-022
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
Avaya
9.3
6.9
10.0
7.9
7.5