Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-0045 | First vendor Publication | 2005-05-02 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0045 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1606 | |||
Oval ID: | oval:org.mitre.oval:def:1606 | ||
Title: | SMB Code Execution Vulnerability (32-bit XP) | ||
Description: | The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0045 | Version: | 6 |
Platform(s): | Microsoft Windows XP | Product(s): | SMB (Server Message Block) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1847 | |||
Oval ID: | oval:org.mitre.oval:def:1847 | ||
Title: | SMB Code Execution Vulnerability (Server 2003 / 64-bit XP) | ||
Description: | The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0045 | Version: | 2 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | SMB (Server Message Block) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:1889 | |||
Oval ID: | oval:org.mitre.oval:def:1889 | ||
Title: | SMB Code Execution Vulnerability (XP,SP1) | ||
Description: | The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0045 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | SMB (Server Message Block) |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:4043 | |||
Oval ID: | oval:org.mitre.oval:def:4043 | ||
Title: | SMB Code Execution Vulnerability (Windows 2000) | ||
Description: | The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-0045 | Version: | 8 |
Platform(s): | Microsoft Windows 2000 | Product(s): | SMB (Server Message Block) |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2005-06-23 | MS Windows (SMB) Transaction Response Handling Exploit (MS05-011) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
13600 | Microsoft Windows SMB Transaction Data Overflow A remote overflow exists in Windows. The Trans and Trans2 commands fail to validate SMB transaction data resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows SMB-DS Trans2 FIND_FIRST2 response andx overflow attempt RuleID : 3146-community - Revision : 18 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB-DS Trans2 FIND_FIRST2 response andx overflow attempt RuleID : 3146 - Revision : 18 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB-DS Trans2 FIND_FIRST2 response overflow attempt RuleID : 3145-community - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB-DS Trans2 FIND_FIRST2 response overflow attempt RuleID : 3145 - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB Trans2 FIND_FIRST2 response andx overflow attempt RuleID : 3144-community - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB Trans2 FIND_FIRST2 response andx overflow attempt RuleID : 3144 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB Trans2 FIND_FIRST2 command response overflow attempt RuleID : 3143-community - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB Trans2 FIND_FIRST2 command response overflow attempt RuleID : 3143 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB client TRANS response paramcount overflow attempt RuleID : 19972 - Revision : 13 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB client TRANS response Find_First2 filename overflow att... RuleID : 17746 - Revision : 17 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-02-08 | Name : Arbitrary code can be executed on the remote host. File : smb_nt_ms05-011.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:15 |
|
2024-11-28 12:06:40 |
|
2024-08-02 12:03:05 |
|
2024-08-02 01:01:37 |
|
2024-02-02 01:02:50 |
|
2024-02-01 12:01:38 |
|
2023-09-05 12:02:42 |
|
2023-09-05 01:01:29 |
|
2023-09-02 12:02:43 |
|
2023-09-02 01:01:29 |
|
2023-08-12 12:03:16 |
|
2023-08-12 01:01:30 |
|
2023-08-11 12:02:49 |
|
2023-08-11 01:01:31 |
|
2023-08-06 12:02:37 |
|
2023-08-06 01:01:31 |
|
2023-08-04 12:02:41 |
|
2023-08-04 01:01:31 |
|
2023-07-14 12:02:40 |
|
2023-07-14 01:01:31 |
|
2023-03-29 01:02:44 |
|
2023-03-28 12:01:36 |
|
2022-10-11 12:02:23 |
|
2022-10-11 01:01:23 |
|
2021-05-04 12:02:43 |
|
2021-04-22 01:02:55 |
|
2020-05-23 00:16:16 |
|
2019-05-09 12:01:29 |
|
2019-04-30 21:19:18 |
|
2018-10-13 00:22:30 |
|
2017-10-11 09:23:26 |
|
2017-07-11 12:01:47 |
|
2016-10-18 12:01:33 |
|
2016-04-26 13:13:35 |
|
2014-02-17 10:29:39 |
|
2014-01-19 21:22:30 |
|
2013-05-11 11:19:35 |
|