Public exploits available
A denial of service vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB compounded requests.
An attacker who successfully exploited this vulnerability could cause a user's system to stop responding until manually restarted.
Server Message Block (SMB) is the file sharing protocol used by default on Windows-based computers. SMB Version 2.0 (SMBv2) is an update to this protocol, and is only supported on computers running Windows Server 2008, Windows 7, and Windows Vista. SMBv2 can only be used if both client and server support it. The vulnerability is caused by the Microsoft Server Message Block (SMB) protocol software insufficiently handling specially crafted compounded requests. An attacker could try to exploit the vulnerability by creating a specially crafted SMB packet and sending the packet to an affected system.
All applications not on the affected list.
This signature can cause false positives if you are not running any of the affected software versions or if you've already applied the patch.