TippingPoint Zero Day Initiative

Microsoft SMB NT Trans Request Parsing Remote Code Execution Vulnerability

ZDI-09-001: January 13th, 2009


Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6662. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to trigger a denial of service condition on vulnerable installations of Microsoft Windows; remote code execution is also theoretically possible. User interaction is not required to exploit this vulnerability.

The specific flaw exists in the processing of SMB requests. By specifying malformed values during an NT Trans request an attacker can cause the target system to kernel panic thereby requiring a reboot of the system. Further manipulation can theoretically result in remote unauthenticated code execution.

Vendor Response

Microsoft has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2008-06-25 - Vulnerability reported to vendor
    2009-01-13 - Coordinated public release of advisory


This vulnerability was discovered by: