7.5
CVSSv2

CVE-2005-0045

Published: 02/05/2005 Updated: 30/04/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote malicious users to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2003 server standard

microsoft windows 2003 server web

microsoft windows nt 4.0

microsoft windows xp

microsoft windows 2003 server enterprise

microsoft windows 2003 server enterprise_64-bit

microsoft windows 2003 server r2

Exploits

/* * Windows SMB Client Transaction Response Handling * * MS05-011 * CAN-2005-0045 * * This works against >> Win2k << * * cybertronic[at]gmx[dot]net * wwwlivejournalcom/users/cybertronic/ * * usage: * gcc -o mssmb_poc mssmb_pocc * /mssmb_poc * * connect via \\ip * and hit the netbios folder! * * ***STOP: 0x0 ...