Executive Summary

Summary
Title Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-067 to MS08-069
Informations
Name HPSBST02386 SSRT080164 First vendor Publication 2008-11-17
Vendor HP Last vendor Modification 2008-11-17
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.

Original Source

Url : http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01606691

CWE : Common Weakness Enumeration

% Id Name
40 % CWE-200 Information Exposure
20 % CWE-362 Race Condition
20 % CWE-287 Improper Authentication
20 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5793
 
Oval ID: oval:org.mitre.oval:def:5793
Title: MSXML Memory Corruption Vulnerability
Description: Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2007-0099
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5847
 
Oval ID: oval:org.mitre.oval:def:5847
Title: MSXML Header Request Vulnerability
Description: Cross-domain vulnerability in Microsoft XML Core Services 3.0 through 6.0, as used in Microsoft Expression Web, Office, Internet Explorer, and other products, allows remote attackers to obtain sensitive information from another domain and corrupt the session state via HTTP request header fields, as demonstrated by the Transfer-Encoding field, aka "MSXML Header Request Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-4033
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s): Microsoft Office 2003
Microsoft Office 2008
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5999
 
Oval ID: oval:org.mitre.oval:def:5999
Title: MSXML DTD Cross-Domain Scripting Vulnerability
Description: Cross-domain vulnerability in Microsoft XML Core Services 3.0 and 4.0, as used in Internet Explorer, allows remote attackers to obtain sensitive information from another domain via a crafted XML document, related to improper error checks for external DTDs, aka "MSXML DTD Cross-Domain Scripting Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-4029
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6012
 
Oval ID: oval:org.mitre.oval:def:6012
Title: SMB Credential Reflection Vulnerability
Description: Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
Family: windows Class: vulnerability
Reference(s): CVE-2008-4037
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6093
 
Oval ID: oval:org.mitre.oval:def:6093
Title: Server Service Vulnerability
Description: The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2008-4250
Version: 4
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 4
Os 10
Os 1
Os 6
Os 3
Os 5
Os 4

SAINT Exploits

Description Link
Windows Server Service buffer overflow MS08-067 More info here
Windows SMB credential reflection vulnerability More info here

ExploitDB Exploits

id Description
2008-11-23 Microsoft XML Core Services DTD - Cross-Domain Scripting PoC (MS08-069)

OpenVAS Exploits

Date Description
2009-04-17 Name : Conficker Detection
File : nvt/conficker.nasl
2008-11-12 Name : SMB Could Allow Remote Code Execution Vulnerability (957097)
File : nvt/secpod_ms08-068_900057.nasl
2008-11-12 Name : Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
File : nvt/secpod_ms08-069_900058.nasl
2008-10-30 Name : Vulnerability in Server Service Could Allow Remote Code Execution (958644)
File : nvt/secpod_ms08-067_900056.nasl
2008-10-24 Name : Server Service Could Allow Remote Code Execution Vulnerability (958644)
File : nvt/secpod_ms08-067_900055.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
50279 Microsoft XML Core Services HTTP Request Header Field Cross-domain Session St...

49926 Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Sc...

49736 Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execu...

Windows contains a flaw that may allow a malicious remote user to execute arbitrary code. The issue is triggered by a flaw that allows an attacker to replay the NTLM credentials of a client user. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.
49243 Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Rem...

Microsoft Windows Server Service contains a flaw that may allow a malicious user to remotely execute arbitrary code. The issue is triggered when a crafted RPC request is handled. It is possible that the flaw may allow remote code execution resulting in a loss of integrity.
32627 Microsoft IE msxml3 Module Nested Tag Race Condition DoS

Information Assurance Vulnerability Management (IAVM)

Date Description
2008-11-13 IAVM : 2008-A-0084 - Multiple Vulnerabilities in Microsoft XML Core Services
Severity : Category II - VMSKEY : V0017877
2008-10-23 IAVM : 2008-A-0081 - Microsoft Server Service Remote Code Execution Vulnerability
Severity : Category I - VMSKEY : V0017870

Snort® IPS/IDS

Date Description
2019-09-17 Microsoft XML core services cross-domain information disclosure attempt
RuleID : 51038 - Revision : 1 - Type : BROWSER-IE
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33829 - Revision : 2 - Type : OS-WINDOWS
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33828 - Revision : 2 - Type : OS-WINDOWS
2015-04-14 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 33827 - Revision : 2 - Type : OS-WINDOWS
2014-01-10 Microsoft XML core services cross-domain information disclosure attempt
RuleID : 19818 - Revision : 9 - Type : OS-WINDOWS
2014-01-10 Microsoft XML Core Services MIME Viewer memory corruption attempt
RuleID : 17730 - Revision : 9 - Type : OS-WINDOWS
2014-01-10 possible SMB replay attempt - overlapping encryption keys detected
RuleID : 17723 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 Microsoft XML Core Services cross-site information disclosure attempt
RuleID : 17572 - Revision : 11 - Type : OS-WINDOWS
2014-01-10 Telnet-based NTLM replay attack attempt
RuleID : 15847 - Revision : 14 - Type : OS-WINDOWS
2014-01-10 SMB replay attempt via NTLMSSP - overlapping encryption keys detected
RuleID : 15453 - Revision : 16 - Type : OS-WINDOWS
2014-01-10 Web-based NTLM replay attack attempt
RuleID : 15124 - Revision : 17 - Type : OS-WINDOWS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode overflow attempt
RuleID : 15068 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode object call overflow ...
RuleID : 15067 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian overflo...
RuleID : 15066 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian object ...
RuleID : 15065 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian andx ov...
RuleID : 15064 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian andx ob...
RuleID : 15063 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode andx overflow attempt
RuleID : 15062 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode andx object call over...
RuleID : 15061 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel overflow attempt
RuleID : 15060 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel object call overflow attempt
RuleID : 15059 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian overflow attempt
RuleID : 15058 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian object call ove...
RuleID : 15057 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian andx overflow a...
RuleID : 15056 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian andx object cal...
RuleID : 15055 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel andx overflow attempt
RuleID : 15054 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel andx object call overflow att...
RuleID : 15053 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode overflow at...
RuleID : 15052 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode object call...
RuleID : 15051 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little endi...
RuleID : 15050 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little endi...
RuleID : 15049 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little endi...
RuleID : 15048 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little endi...
RuleID : 15047 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode andx overfl...
RuleID : 15046 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode andx object...
RuleID : 15045 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX overflow attempt
RuleID : 15044 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX object call overflo...
RuleID : 15043 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian overf...
RuleID : 15042 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian objec...
RuleID : 15041 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian andx ...
RuleID : 15040 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian andx ...
RuleID : 15039 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX andx overflow attempt
RuleID : 15038 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX andx object call ov...
RuleID : 15037 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode overflow attempt
RuleID : 15036 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian over...
RuleID : 15035 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode little endian andx...
RuleID : 15034 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel unicode andx overflow attempt
RuleID : 15033 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel overflow attempt
RuleID : 15032 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian overflow att...
RuleID : 15031 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian andx overflo...
RuleID : 15030 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel andx overflow attempt
RuleID : 15029 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode overflow...
RuleID : 15028 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little e...
RuleID : 15027 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode little e...
RuleID : 15026 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX unicode andx ove...
RuleID : 15025 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX overflow attempt
RuleID : 15024 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian ov...
RuleID : 15023 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX little endian an...
RuleID : 15022 - Revision : 5 - Type : NETBIOS
2015-05-28 SMB v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel WriteAndX andx overflow at...
RuleID : 15021 - Revision : 5 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel overflow attempt
RuleID : 15020 - Revision : 5 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel object call o...
RuleID : 15019 - Revision : 5 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian...
RuleID : 15018 - Revision : 5 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel little endian...
RuleID : 15017 - Revision : 5 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP v4 wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel overflow a...
RuleID : 15016 - Revision : 5 - Type : NETBIOS
2014-01-10 DCERPC NCACN-IP-TCP wkssvc NetrUseAdd/NetrUseGetInfo/NetrUseDel overflow attempt
RuleID : 15015 - Revision : 17 - Type : OS-WINDOWS
2014-01-10 Microsoft Internet Explorer MSXML DLL memory corruption attempt
RuleID : 15012 - Revision : 9 - Type : BROWSER-IE
2015-05-28 Microsoft XML core services cross-domain information disclosure attempt
RuleID : 15011 - Revision : 7 - Type : WEB-CLIENT
2014-01-10 possible SMB replay attempt - overlapping encryption keys detected
RuleID : 15009 - Revision : 22 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows SMB v4 srvsvc NetrpPathCononicalize unicode path cononicali...
RuleID : 14896 - Revision : 9 - Type : OS-WINDOWS
2015-05-28 DCERPC NCADG-IP-UDP srvsvc NetrpPathCanonicalize little endian object call pa...
RuleID : 14895 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP srvsvc NetrpPathCanonicalize little endian object call pa...
RuleID : 14894 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP srvsvc NetrpPathCanonicalize little endian object call path...
RuleID : 14893 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP srvsvc NetrpPathCanonicalize object call path canonicaliz...
RuleID : 14892 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCADG-IP-UDP srvsvc NetrpPathCanonicalize object call path canonicaliz...
RuleID : 14891 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP srvsvc NetrpPathCanonicalize object call path canonicalizat...
RuleID : 14890 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCADG-IP-UDP srvsvc NetrpPathCanonicalize little endian path canonical...
RuleID : 14889 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP srvsvc NetrpPathCanonicalize little endian path canonical...
RuleID : 14888 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP srvsvc NetrpPathCanonicalize little endian path canonicaliz...
RuleID : 14887 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP srvsvc NetrpPathCanonicalize path canonicalization stack ...
RuleID : 14886 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCADG-IP-UDP srvsvc NetrpPathCanonicalize path canonicalization stack ...
RuleID : 14885 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP srvsvc NetrpPathCanonicalize path canonicalization stack ov...
RuleID : 14884 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP v4 srvsvc NetrpPathCanonicalize path canonicalization sta...
RuleID : 14883 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCADG-IP-UDP v4 srvsvc NetrpPathCanonicalize little endian path canoni...
RuleID : 14882 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCACN-IP-TCP v4 srvsvc NetrpPathCanonicalize little endian path canoni...
RuleID : 14881 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP v4 srvsvc NetrpPathCanonicalize little endian path canonica...
RuleID : 14880 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC NCADG-IP-UDP v4 srvsvc NetrpPathCanonicalize path canonicalization sta...
RuleID : 14879 - Revision : 9 - Type : NETBIOS
2015-05-28 DCERPC DIRECT-UDP v4 srvsvc NetrpPathCanonicalize path canonicalization stack...
RuleID : 14878 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode little endian andx path canonical...
RuleID : 14877 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx object ...
RuleID : 14876 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian andx object call path canonica...
RuleID : 14875 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize andx object call path canonicalization stack...
RuleID : 14874 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode andx object call path cano...
RuleID : 14873 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian andx object call pat...
RuleID : 14872 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian andx object call pat...
RuleID : 14871 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian andx object call path canonica...
RuleID : 14870 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx object ...
RuleID : 14869 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode andx object call path cano...
RuleID : 14868 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX andx object call path canonicaliza...
RuleID : 14867 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode andx object call path canonicalizati...
RuleID : 14866 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx path...
RuleID : 14865 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode andx path canonicalization stack ove...
RuleID : 14864 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian andx object call path ...
RuleID : 14863 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode andx object call path canonicalizati...
RuleID : 14862 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian andx object call path ...
RuleID : 14861 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian andx path canonicalization sta...
RuleID : 14860 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize andx path canonicalization stack overflow at...
RuleID : 14859 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx path ca...
RuleID : 14858 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode andx path canonicalization...
RuleID : 14857 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX andx path canonicalization stack o...
RuleID : 14856 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian andx path canonicalization sta...
RuleID : 14855 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian andx path canonicali...
RuleID : 14854 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian andx path canonicali...
RuleID : 14853 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX andx path canonicalization stac...
RuleID : 14852 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode andx path canonicalization stack ...
RuleID : 14851 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX little endian andx path canonic...
RuleID : 14850 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian andx path canonicaliza...
RuleID : 14849 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize andx path canonicalization stack overflow...
RuleID : 14848 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize andx path canonicalization stack overflow at...
RuleID : 14847 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX andx path canonicalization stack o...
RuleID : 14846 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian andx path canonicaliza...
RuleID : 14845 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode andx path canonicalizat...
RuleID : 14844 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode andx path canonicalization stack ove...
RuleID : 14843 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX andx object call path canonicaliza...
RuleID : 14842 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize andx object call path canonicalization stack...
RuleID : 14841 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx path ca...
RuleID : 14840 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize little endian andx path canonicalization ...
RuleID : 14839 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize little endian andx path canonicalization ...
RuleID : 14838 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX andx path canonicalization stac...
RuleID : 14837 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode andx path canonicalization...
RuleID : 14836 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode andx path canonicalizat...
RuleID : 14835 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode little endian andx path canonical...
RuleID : 14834 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX little endian andx path canonic...
RuleID : 14833 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize andx path canonicalization stack overflow...
RuleID : 14832 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode andx path canonicalization stack ...
RuleID : 14831 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode little endian andx path...
RuleID : 14830 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode little endian path canonicalizati...
RuleID : 14829 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian object call ...
RuleID : 14828 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian object call path canonicalizat...
RuleID : 14827 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize object call path canonicalization stack over...
RuleID : 14826 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode object call path canonical...
RuleID : 14825 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian object call path can...
RuleID : 14824 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian object call path can...
RuleID : 14823 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian object call path canonicalizat...
RuleID : 14822 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian object call ...
RuleID : 14821 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode object call path canonical...
RuleID : 14820 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX object call path canonicalization ...
RuleID : 14819 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode object call path canonicalization st...
RuleID : 14818 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode little endian path cano...
RuleID : 14817 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode path canonicalization stack overflow...
RuleID : 14816 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian object call path canon...
RuleID : 14815 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode object call path canonicalization st...
RuleID : 14814 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian object call path canon...
RuleID : 14813 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian path canonicalization stack ov...
RuleID : 14812 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize path canonicalization stack overflow attempt
RuleID : 14811 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian path canonic...
RuleID : 14810 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode path canonicalization stac...
RuleID : 14809 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX path canonicalization stack overfl...
RuleID : 14808 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize little endian path canonicalization stack ov...
RuleID : 14807 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian path canonicalizatio...
RuleID : 14806 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX little endian path canonicalizatio...
RuleID : 14805 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX path canonicalization stack ove...
RuleID : 14804 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode path canonicalization stack overf...
RuleID : 14803 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX little endian path canonicaliza...
RuleID : 14802 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian path canonicalization ...
RuleID : 14801 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize path canonicalization stack overflow attempt
RuleID : 14800 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize path canonicalization stack overflow attempt
RuleID : 14799 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX path canonicalization stack overfl...
RuleID : 14798 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode little endian path canonicalization ...
RuleID : 14797 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode path canonicalization s...
RuleID : 14796 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize unicode path canonicalization stack overflow...
RuleID : 14795 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX object call path canonicalization ...
RuleID : 14794 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize object call path canonicalization stack over...
RuleID : 14793 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode little endian path canonic...
RuleID : 14792 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize little endian path canonicalization stack...
RuleID : 14791 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize little endian path canonicalization stack...
RuleID : 14790 - Revision : 9 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX path canonicalization stack ove...
RuleID : 14789 - Revision : 9 - Type : NETBIOS
2015-05-28 SMB srvsvc NetrpPathCanonicalize WriteAndX unicode path canonicalization stac...
RuleID : 14788 - Revision : 10 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX unicode path canonicalization s...
RuleID : 14787 - Revision : 10 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize unicode little endian path canonicalizati...
RuleID : 14786 - Revision : 10 - Type : NETBIOS-DG
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize WriteAndX little endian path canonicaliza...
RuleID : 14785 - Revision : 10 - Type : NETBIOS
2015-05-28 SMB v4 srvsvc NetrpPathCanonicalize path canonicalization stack overflow attempt
RuleID : 14784 - Revision : 10 - Type : NETBIOS-DG
2014-01-10 DCERPC NCADG-IP-UDP srvsvc NetrpPathCanonicalize path canonicalization stack ...
RuleID : 14783 - Revision : 17 - Type : OS-WINDOWS
2014-01-10 DCERPC NCACN-IP-TCP srvsvc NetrpPathCanonicalize path canonicalization stack ...
RuleID : 14782 - Revision : 21 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2008-11-12 Name : It is possible to execute code on the remote host.
File : smb_nt_ms08-068.nasl - Type : ACT_GATHER_INFO
2008-11-12 Name : Arbitrary code can be executed on the remote host through the web or email cl...
File : smb_nt_ms08-069.nasl - Type : ACT_GATHER_INFO
2008-10-23 Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_kb958644.nasl - Type : ACT_GATHER_INFO
2008-10-23 Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms08-067.nasl - Type : ACT_GATHER_INFO