Advisory Details

October 10th, 2017

Microsoft Windows SMB Out-Of-Bounds Read Denial of Service Vulnerability

ZDI-17-843
ZDI-CAN-5069

CVE ID CVE-2017-11781
CVSS SCORE 6.8, AV:N/AC:L/Au:S/C:N/I:N/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['29694']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to create a denial-of-service on vulnerable installations of Microsoft Windows. Authentication is required to exploit this vulnerability, assuming the product is in its default configuration.

The specific flaw exists within the srv driver. A crafted request to an SMB share can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11781
DISCLOSURE TIMELINE
  • 2017-07-27 - Vulnerability reported to vendor
  • 2017-10-10 - Coordinated public release of advisory
CREDIT pesante
BACK TO ADVISORIES