5.9
CVSSv3

CVE-2017-0147

Published: 17/03/2017 Updated: 21/06/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 452
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote malicious users to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft server_message_block 1.0

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## # auxiliary/scanner/smb/smb_ms_17_010 require 'msf/core' class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::SMB::Client include Msf::Exploit::Remote::SMB::Client::Authenticated inc ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## # Windows XP systems that are not part of a domain default to treating all # network logons as if they were Guest This prevents SMB relay attacks from # gaining administrative access to these systems This sett ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::SMB::Client MAX_SHELLCODE_SIZE = 4096 def initialize(info = {}) super(update_info(info, 'N ...
# Exploit Author: Juan Sacco <juansacco@kpncom> at KPN Red Team - wwwkpncom # Date and time of release: May, 9 2017 - 13:00PM # Found this and more exploits on my open source security project: wwwexploitpackcom # # MS17-010 - technetmicrosoftcom/en-us/library/security/ms17-010aspx # Tested on: Microsoft Wind ...

Github Repositories

the name of virus is the detection of microsoft defender, is the tipic antivirus

Exploit-Win32CVE-2017-0147A the name of virus is the detection of microsoft defender, is the tipic antivirus

the name of virus is the detection of microsoft defender, is the tipic antivirus

Exploit-Win32CVE-2017-0147A the name of virus is the detection of microsoft defender, is the tipic antivirus

TruSTAR Publisher: Splunk Connector Version: 320 Product Vendor: TruSTAR Technology Product Name: TruSTAR Product Version Supported (regex): "*" Minimum Product Version: 610 This App integrates with TruSTAR to provide various hunting and reporting actions Note: Input to all hunt actions must be greater than 3 characters All the hunt actions' endpoints will

Python library for ReversingLabs services - Python 3 version.

ReversingLabsSDK A Python SDK for ReversingLabs REST services (TitaniumCloud and appliances) - Python 3 version The idea behind this SDK is to enable easier out-of-the-box development of software integrations and automation services that need to interact with ReversingLabs The SDK consists of several modules, where each module represents either one ReversingLabs service, Reve

Week 10 & 11 Project: Honeypot

Assignment: Deploy and monitor honeypot Date: 21NOV2021 Objective: Create a honeynet using MHN-Admin Present your findings as if you were requested to give a brief report of the current state of Internet security Assume that your audience is a current employer who is questioning why the company should allocate anymore resources to the IT security team MHN-Admin Deployment Su

TruSTAR Publisher: Splunk Connector Version: 320 Product Vendor: TruSTAR Technology Product Name: TruSTAR Product Version Supported (regex): "*" Minimum Product Version: 610 This App integrates with TruSTAR to provide various hunting and reporting actions Note: Input to all hunt actions must be greater than 3 characters All the hunt actions' endpoints will

Honeypot Assignment Time spent: 4 hours spent in total Objective: Create a honeynet using MHN-Admin Present your findings as if you were requested to give a brief report of the current state of Internet security Assume that your audience is a current employer who is questioning why the company should allocate anymore resources to the IT security team MHN-Admin Deployment (Re

Recent Articles

WannaCrypt ransomware snatches NSA exploit, fscks over Telefónica, other orgs in Spain
The Register • John Leyden • 12 May 2017

EternalBlue now an eternal headache

Updated Workers at Telefónica's Madrid headquarters were left staring at their screen on Friday following a ransomware outbreak. Telefónica was one of several victims of a widespread file-encrypting ransomware outbreak, El Pais reports. Telefónica has confirmed the epidemic on its intranet while downplaying its seriousness, saying everything was under control. Fixed and mobile telephony services provided by the firm have not been affected. Other Spanish targets of the attack reportedly includ...