Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2017-0147
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability.".
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 5.9/10
- Exploit Score
- 2.2/10
- Access Vector
- Network
- Access Complexity
- High
- Privileges Required
- None
- Impact Score
- 3.6/10
- Confidentiality Impact
- High
- Availability Impact
- None
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* |
No
|
- |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147
- http://www.securityfocus.com/bid/96709
- http://www.securitytracker.com/id/1037991
- https://www.exploit-db.com/exploits/41987/
- https://www.exploit-db.com/exploits/41891/
- https://www.exploit-db.com/exploits/43970/
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf
- http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralizatio
- http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html