Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-0045

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2005-0045
Last Modified 10 Sep 2008 03:34:49
Published 02 May 2005 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-0045

Summary

The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.

Vulnerable Systems

Operating System

  • Microsoft Windows 2000

  • Microsoft Windows 2003 Server Enterprise

  • Microsoft Windows 2003 Server Enterprise 64-bit

  • Microsoft Windows 2003 Server R2

  • Microsoft Windows 2003 Server Standard

  • Microsoft Windows 2003 Server Web

  • Microsoft Windows Nt 4.0

  • Microsoft Windows Xp


References

CERT - TA05-039A

CERT-VN - VU#652537

XF - win-smb-code-execution(19089)

MS - MS05-011

NTBUGTRAQ - 20050209 EEYE: Windows SMB Client Transaction Response Handling Vulnerability

BUGTRAQ - 20050309 Update: MS05-011 EEYE: Windows SMB Client Transaction Response Handling Vulnerability

BID - 12484


Last Updated: 27 May 2016 10:39:38