Short Name |
SMB:OF:INVALID-DATACOUNT |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Invalid DataCount |
Release Date |
2010/08/09 |
Update Number |
1749 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Microsoft NetBIOS layer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the kernel.
Microsoft Windows is prone to a remote code-execution vulnerability that affects the Microsoft Server Message Block (SMB) protocol software. A remote attacker can exploit this issue to execute code with SYSTEM-level privileges. Failed exploit attempts will likely cause denial-of-service conditions. NOTE: To exploit this issue, an attacker must have read permissions on an SMB share on the target system. By default, Windows XP grants this access; later systems will require the attacker to authenticate to the server, or require the server to be configured in a way to automatically grant read permissions.