← Zuruck zu CVEs
CVE-2009-3103
N/ABeschreibung
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht9/8/2009
Zuletzt geandert4/23/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
microsoft:windows_server_2008microsoft:windows_vista
Schwachen (CWE)
CWE-399
Referenzen
http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0090.html(secure@microsoft.com)
http://blog.48bits.com/?p=510(secure@microsoft.com)
http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html(secure@microsoft.com)
http://isc.sans.org/diary.html?storyid=7093(secure@microsoft.com)
http://osvdb.org/57799(secure@microsoft.com)
http://secunia.com/advisories/36623(secure@microsoft.com)
http://www.exploit-db.com/exploits/9594(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/135940(secure@microsoft.com)
http://www.microsoft.com/technet/security/advisory/975497.mspx(secure@microsoft.com)
http://www.reversemode.com/index.php?option=com_content&task=view&id=64&Itemid=1(secure@microsoft.com)
http://www.securityfocus.com/archive/1/506300/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/archive/1/506327/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/36299(secure@microsoft.com)
http://www.securitytracker.com/id?1022848(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA09-286A.html(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53090(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6489(secure@microsoft.com)
http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0090.html(af854a3a-2127-422b-91ae-364da2661108)
http://blog.48bits.com/?p=510(af854a3a-2127-422b-91ae-364da2661108)
http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html(af854a3a-2127-422b-91ae-364da2661108)
http://isc.sans.org/diary.html?storyid=7093(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/57799(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/36623(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/9594(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/135940(af854a3a-2127-422b-91ae-364da2661108)
http://www.microsoft.com/technet/security/advisory/975497.mspx(af854a3a-2127-422b-91ae-364da2661108)
http://www.reversemode.com/index.php?option=com_content&task=view&id=64&Itemid=1(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/506300/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/506327/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36299(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1022848(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA09-286A.html(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53090(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6489(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.