The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate fields in SMB transaction responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Transaction Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7164 | vdb entry signature |
http://secunia.com/advisories/39372 | third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020 | vendor advisory |
http://www.us-cert.gov/cas/techalerts/TA10-103A.html | third party advisory us government resource |