The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8278 | vdb entry signature |
http://www.us-cert.gov/cas/techalerts/TA10-040A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-006 | vendor advisory |