Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0021 | First vendor Publication | 2010-02-10 |
Vendor | Cve | Last vendor Modification | 2025-01-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple race conditions in the SMB implementation in the Server service in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allow remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 Negotiate packet, aka "SMB Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0021 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-362 | Race Condition |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:8524 | |||
Oval ID: | oval:org.mitre.oval:def:8524 | ||
Title: | SMB Memory Corruption Vulnerability | ||
Description: | Multiple race conditions in the SMB implementation in the Server service in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allow remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 Negotiate packet, aka "SMB Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0021 | Version: | 3 |
Platform(s): | Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-10-17 | Windows NTLM Weak Nonce Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-22 | Name : Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468) File : nvt/secpod_ms10-012-remote.nasl |
2010-02-10 | Name : Microsoft Windows SMB Server Multiple Vulnerabilities (971468) File : nvt/secpod_ms10-012.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62255 | Microsoft Windows SMB Server Crafted Packet Handling Remote DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2018-06-12 | SMB client NULL deref race condition attempt RuleID : 46637 - Revision : 1 - Type : NETBIOS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 17723 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | SMB client NULL deref race condition attempt RuleID : 16418 - Revision : 10 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB unicode invalid server name share access RuleID : 16404 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode andx invalid server name share access RuleID : 16403 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB invalid server name share access RuleID : 16402 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB andx invalid server name share access RuleID : 16401 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode invalid server name share access RuleID : 16400 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode andx invalid server name share access RuleID : 16399 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB invalid server name share access RuleID : 16398 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB andx invalid server name share access RuleID : 16397 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | SMB server srvnet.sys driver race condition attempt RuleID : 16396 - Revision : 5 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB COPY command oversized pathname attempt RuleID : 16395 - Revision : 7 - Type : OS-WINDOWS |
2014-01-10 | Telnet-based NTLM replay attack attempt RuleID : 15847 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | SMB replay attempt via NTLMSSP - overlapping encryption keys detected RuleID : 15453 - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Web-based NTLM replay attack attempt RuleID : 15124 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 15009 - Revision : 22 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-13 | Name : It is possible to execute arbitrary code on the remote Windows host due to fl... File : smb_kb971468.nasl - Type : ACT_GATHER_INFO |
2010-02-09 | Name : It is possible to execute arbitrary code on the remote Windows host due to fl... File : smb_nt_ms10-012.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-21 21:21:13 |
|
2024-11-28 23:09:25 |
|
2024-11-28 12:20:50 |
|
2023-12-07 21:28:04 |
|
2021-05-04 12:10:53 |
|
2021-04-22 01:11:26 |
|
2020-05-23 00:25:02 |
|
2018-10-31 00:20:00 |
|
2018-10-13 00:22:53 |
|
2017-09-19 09:23:34 |
|
2016-08-31 12:02:01 |
|
2016-08-05 12:02:22 |
|
2016-06-28 17:59:22 |
|
2016-04-26 19:29:13 |
|
2014-02-17 10:53:03 |
|
2014-01-19 21:26:28 |
|
2013-05-10 23:13:14 |
|