Advisory Details

October 10th, 2017

Microsoft Windows SMB Out-Of-Bounds Read Denial of Service Vulnerability

ZDI-17-843
ZDI-CAN-5069

CVE ID CVE-2017-11781
CVSS SCORE 6.8, (AV:N/AC:L/Au:S/C:N/I:N/A:C)
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 29694. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to create a denial-of-service on vulnerable installations of Microsoft Windows. Authentication is required to exploit this vulnerability, assuming the product is in its default configuration.

The specific flaw exists within the srv driver. A crafted request to an SMB share can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11781
DISCLOSURE TIMELINE
  • 2017-07-27 - Vulnerability reported to vendor
  • 2017-10-10 - Coordinated public release of advisory
CREDIT pesante
BACK TO ADVISORIES