Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0016 | First vendor Publication | 2010-02-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0016 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:8278 | |||
Oval ID: | oval:org.mitre.oval:def:8278 | ||
Title: | SMB Client Pool Corruption Vulnerability | ||
Description: | The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0016 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2010-02-10 | Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (978251) File : nvt/secpod_ms10-006.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62244 | Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code... |
Snort® IPS/IDS
Date | Description |
---|---|
2018-06-12 | SMB client NULL deref race condition attempt RuleID : 46637 - Revision : 1 - Type : NETBIOS |
2014-01-10 | SMB client NULL deref race condition attempt RuleID : 16418 - Revision : 10 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB Negotiate Protocol Response overflow attempt RuleID : 16417 - Revision : 12 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-02-09 | Name : Arbitrary code can be executed on the remote host through its SMB client. File : smb_nt_ms10-006.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:09:25 |
|
2024-11-28 12:20:49 |
|
2022-10-11 01:03:08 |
|
2021-05-04 12:10:57 |
|
2021-04-22 01:11:26 |
|
2020-05-23 00:25:01 |
|
2019-05-08 12:02:59 |
|
2019-02-26 17:19:32 |
|
2018-10-13 00:22:53 |
|
2017-09-19 09:23:34 |
|
2016-04-26 19:29:10 |
|
2014-02-17 10:53:02 |
|
2014-01-19 21:26:27 |
|
2013-05-10 23:13:00 |
|