PT-2009-1117 · Microsoft · Windows

Laurent Gaffié

·

Published

2009-09-08

·

Updated

2026-01-24

·

CVE-2009-3103

CVSS v2.0

10

High

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Microsoft Windows versions prior to a fixed version
Description The issue is related to an array index error in the SMBv2 protocol implementation, allowing remote attackers to execute arbitrary code or cause a denial of service via a specially crafted NEGOTIATE PROTOCOL REQUEST packet. This can be achieved by including an & (ampersand) character in a Process ID High header field, which triggers an attempted dereference of an out-of-bounds memory location. The vulnerability can also be exploited by sending specially crafted SMB packets to a computer running the Server service, potentially allowing an attacker to take complete control of the system.
Recommendations For Microsoft Windows versions prior to a fixed version, apply the necessary patches or updates to resolve the issue. As a temporary workaround, consider restricting access to the SMBv2 protocol to minimize the risk of exploitation. Avoid using the Process ID High header field in the NEGOTIATE PROTOCOL REQUEST packet until the issue is resolved.

Exploit

Fix

DoS

RCE

Weakness Enumeration

Related Identifiers

BDU:2021-04407
CVE-2009-3103

Affected Products

Windows