The Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client in Windows 8.1 and RT 8.1 and Windows Server 2012 R2 allows a denial of service vulnerability due to how specially crafted requests are handled, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability".
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/102924 | vdb entry third party advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0833 | patch vendor advisory |
http://www.securitytracker.com/id/1040375 | vdb entry third party advisory |
https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-0833 | third party advisory exploit |
https://www.exploit-db.com/exploits/44189/ | exploit vdb entry third party advisory |