PT-2009-1117 · Microsoft · Windows
Laurent Gaffié
·
Published
2009-09-08
·
Updated
2026-01-24
·
CVE-2009-3103
CVSS v2.0
10
High
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to a fixed version
Description
The issue is related to an array index error in the SMBv2 protocol implementation, allowing remote attackers to execute arbitrary code or cause a denial of service via a specially crafted NEGOTIATE PROTOCOL REQUEST packet. This can be achieved by including an & (ampersand) character in a Process ID High header field, which triggers an attempted dereference of an out-of-bounds memory location. The vulnerability can also be exploited by sending specially crafted SMB packets to a computer running the Server service, potentially allowing an attacker to take complete control of the system.
Recommendations
For Microsoft Windows versions prior to a fixed version, apply the necessary patches or updates to resolve the issue.
As a temporary workaround, consider restricting access to the SMBv2 protocol to minimize the risk of exploitation.
Avoid using the
Process ID High header field in the NEGOTIATE PROTOCOL REQUEST packet until the issue is resolved.Exploit
Fix
DoS
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows