Short Name |
SMB:EXPLOIT:TRANS2-MDL-CHUNK |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Trans2 Response Chunk mismatch |
Release Date |
2011/04/11 |
Update Number |
1900 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Microsoft Server Message Block (SMB) client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the kernel (ring0).
Microsoft Windows is prone to a remote code-execution vulnerability that affects the SMB client. Successful exploits can allow attackers to execute arbitrary code with full user rights. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.