Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability

Information

Severity

Severity

Critical

Family

Family

Windows

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

Microsoft Windows is prone to a remote code-execution vulnerability when processing the protocol headers for the Server Message Block (SMB) Negotiate Protocol Request. NOTE: Reportedly, for this issue to be exploitable, file sharing must be enabled.

Affected Software

Affected Software

Windows 7 RC, Vista and 2008 Server are vulnerable, other versions may also be affected. NOTE: Reportedly, Windows XP and 2000 are not affected. UPDATE (September 9, 2009): Symantec has confirmed the issue on Windows Vista SP1 and Windows Server 2008.

Detection Method

Detection Method

Opens a TCP socket to send a crafted request and checks if the host responds to a second request after a few seconds.

Solution

Solution

Microsoft has released updates to fix the issue. Please see the references for more information.

Common Vulnerabilities and Exposures (CVE)