Short Name |
SMB:MS-SMBV1-OOB-READ-DOS |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Microsoft Windows SMB Server SMBv1 Out Of Bound Read |
Release Date |
2017/11/07 |
Update Number |
3003 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
An out of bounds read vulnerability has been reported in the SMB Server component of Microsoft Windows.A remote, authenticated attacker could exploit the vulnerability by sending a crafted SMBv1 request to a target SMB server. Successful exploitation could possibly result in denial of services conditions.
The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows a denial of service vulnerability when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability".