Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-012.
Impact
Successful exploitation will allow remote attackers to execute arbitrary code or cause a denial of service or bypass the authentication mechanism via brute force technique.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms10-012.mspx
Insight
- An input validation error exists while processing SMB requests and can be exploited to cause a buffer overflow via a specially crafted SMB packet.
- An error exists in the SMB implementation while parsing SMB packets during the Negotiate phase causing memory corruption via a specially crafted SMB packet.
- NULL pointer dereference error exists in SMB while verifying the 'share' and 'servername' fields in SMB packets causing denial of service.
- A lack of cryptographic entropy when the SMB server generates challenges during SMB NTLM authentication and can be exploited to bypass the authentication mechanism.
Affected
Micorsoft Windows 7
Microsoft Windows 2K Service Pack 4 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2K3 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1/2 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2010-0020, CVE-2010-0021, CVE-2010-0022, CVE-2010-0231 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
- Cumulative Security Update for Internet Explorer (928090)
- Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
- Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (2879017)
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)