Follow:

Vuln:Win/SMB.Browser.DoS!NIS-2011-0003

Severity rating
Critical

Class/Type
Vulnerability

Discovered date
2011-02-14T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
Yes

Signature detection
Medium



On this page




Description

A denial of service vulnerability exists in the way that the Microsoft Server Message Block (SMB) client implementation handles specially crafted SMB messages.



Impact

An attacker who successfully exploited this vulnerability could cause a user's system to stop responding until manually restarted.



Technical details (analysis)

Microsoft Server Message Block (SMB) protocol is a Microsoft network file sharing protocol used in Microsoft Windows. For more information on SMB, see the MSDN article, Microsoft SMB Protocol and CIFS Protocol Overview. The vulnerability exists because the Microsoft Server Message Block (SMB) client implementation incorrectly handles malformed SMB messages.



Affected software

Windows Server 2003



Non-affected software

All applications not on the affected list.



References





Solutions




NIS signature

Name: Vuln:Win/SMB.Browser.DoS!NIS-2011-0003
Release Date: 2011-02-14T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

No known work-arounds at this time.