SMB: Microsoft Windows SMB Client Transaction Response Buffer Overflow

A remote code execution vulnerability exists in Microsoft Windows SMB Client. The vulnerability is due to improper validation of certain fields when handling SMB transaction responses. Remote unauthenticated attackers could exploit this vulnerability by enticing a user to connect to a malicious SMB server and sending a specially crafted SMB response to the target machine. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the operating system kernel. Code injection that does not result in execution could crash the target system, and result in a Denial of Service condition.

Extended Description

Microsoft Windows is prone to a remote stack-based buffer-overflow vulnerability. An attacker can exploit this issue to execute code with SYSTEM-level privileges. Failed exploit attempts will likely cause denial-of-service conditions.

Affected Products

Avaya messaging_application_server,Nortel_networks contact_center_manager_server

References

BugTraq: 39339

CVE: CVE-2010-0270

Short Name
SMB:TRANSACTION-RESPONSE-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
Buffer CVE-2010-0270 Client Microsoft Overflow Response SMB Transaction Windows bid:39339
Release Date
10/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

10.0

Found a potential security threat?