7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
6.1 Medium
AI Score
Confidence
Low
0.952 High
EPSS
Percentile
99.4%
The SMB client in the kernel in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to cause a denial of service (infinite loop and system hang) via a (1) SMBv1 or (2) SMBv2 response packet that contains (a) an incorrect length value in a NetBIOS header or (b) an additional length field at the end of this response packet, aka “SMB Client Incomplete Response Vulnerability.”
CPE | Name | Operator | Version |
---|---|---|---|
microsoft:windows_7 | microsoft windows 7 | eq | * |
microsoft:windows_server_2008 | microsoft windows server 2008 | eq | r2 |
blogs.technet.com/msrc/archive/2009/11/13/microsoft-security-advisory-977544-released.aspx
g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html
news.cnet.com/8301-27080_3-10395891-245.html
praetorianprefect.com/archives/2009/11/how-to-crash-windows-7-and-server-2008/
seclists.org/fulldisclosure/2009/Nov/134
secunia.com/advisories/37347
secunia.com/blog/66/
www.microsoft.com/technet/security/advisory/977544.mspx
www.securitytracker.com/id?1023179
www.us-cert.gov/cas/techalerts/TA10-103A.html
www.vupen.com/english/advisories/2009/3216
docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7186