10
CVSSv2

CVE-2010-0231

Published: 10/02/2010 Updated: 07/12/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not use a sufficient source of entropy, which allows remote malicious users to obtain access to files and other SMB resources via a large number of authentication requests, related to server-generated challenges, certain "duplicate values," and spoofing of an authentication token, aka "SMB NTLM Authentication Lack of Entropy Vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008

microsoft windows xp

microsoft windows server 2008 -

microsoft windows xp -

microsoft windows vista

microsoft windows 2003 server -

microsoft windows 2000

microsoft windows 7 -

microsoft windows 2003 server

Exploits

Windows SMB NTLM Authentication Weak Nonce Vulnerability Security Advisory Hernan Ochoa (hernan@ampliasecuritycom) - Agustin Azubel (aazubel@ampliasecuritycom) Title: Windows SMB NTLM Authentication Weak Nonce Vulnerability Advisory ID: OCHOA-2010-0209 Advisory URL: wwwhexaleorg/advisories/OCHOA-2010-0209txt Date published: 20 ...
Flaws in Microsoft's implementation of the NTLM challenge-response authentication protocol causing the server to generate duplicate challenges/nonces and an information leak allow an unauthenticated remote attacker without any kind of credentials to access the SMB service of the target system under the credentials of an authorized user Depending o ...

Github Repositories

Useful scripts

Scripts I will be putting fixed, modified or created scripts here that are not necessarily part of a project ssh-check-usernamepy Original: bugfuzzcom/stuff/ssh-check-usernamepy I had an issue running this script with the current Kali The problem is with changes to paramiko See: paramiko/paramiko#1314 The solution is to replace instances of the text '_handle

Recent Articles

EMC slings patch at remote hack nonce-nse
The Register • Team Register • 11 Jan 2017

Smells like 2010

Remote attackers can hose EMC hybrid flash storage thanks to cryptographic weaknesses. The patched vulnerability (CVE-2016-0917) affects EMC's VNX1, VNX2 and VNXe systems, including the end-of-life Celerra which will not receive a fix. EMC researchers wrote in a security notice that remote attackers could access the SMB service using administrator credentials by messing with authentication protocols such that duplicate cryptographic nonces are produced. "An unauthenticated remote attacker may po...