Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0231 | First vendor Publication | 2010-02-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not use a sufficient source of entropy, which allows remote attackers to obtain access to files and other SMB resources via a large number of authentication requests, related to server-generated challenges, certain "duplicate values," and spoofing of an authentication token, aka "SMB NTLM Authentication Lack of Entropy Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0231 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-310 | Cryptographic Issues |
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7751 | |||
Oval ID: | oval:org.mitre.oval:def:7751 | ||
Title: | SMB NTLM Authentication Lack of Entropy Vulnerability | ||
Description: | The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not use a sufficient source of entropy, which allows remote attackers to obtain access to files and other SMB resources via a large number of authentication requests, related to server-generated challenges, certain "duplicate values," and spoofing of an authentication token, aka "SMB NTLM Authentication Lack of Entropy Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0231 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-10-17 | Windows NTLM Weak Nonce Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-22 | Name : Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468) File : nvt/secpod_ms10-012-remote.nasl |
2010-02-10 | Name : Microsoft Windows SMB Server Multiple Vulnerabilities (971468) File : nvt/secpod_ms10-012.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62253 | Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness Flaws in Microsoft's implementation of the NTLM challenge-response authentication protocol causing the server to generate duplicate challenges/nonces and an information leak allow an unauthenticated remote attacker without any kind of credentials to access the SMB service of the target system under the credentials of an authorized user. Depending on the privileges of the user, the attacker will be able to obtain and modify files on the target system and execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2018-06-12 | SMB client NULL deref race condition attempt RuleID : 46637 - Revision : 1 - Type : NETBIOS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 17723 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | SMB client NULL deref race condition attempt RuleID : 16418 - Revision : 10 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB unicode invalid server name share access RuleID : 16404 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode andx invalid server name share access RuleID : 16403 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB invalid server name share access RuleID : 16402 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB andx invalid server name share access RuleID : 16401 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode invalid server name share access RuleID : 16400 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB unicode andx invalid server name share access RuleID : 16399 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB invalid server name share access RuleID : 16398 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB andx invalid server name share access RuleID : 16397 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | SMB server srvnet.sys driver race condition attempt RuleID : 16396 - Revision : 5 - Type : NETBIOS |
2014-01-10 | Microsoft Windows SMB COPY command oversized pathname attempt RuleID : 16395 - Revision : 7 - Type : OS-WINDOWS |
2014-01-10 | Telnet-based NTLM replay attack attempt RuleID : 15847 - Revision : 14 - Type : OS-WINDOWS |
2014-01-10 | SMB replay attempt via NTLMSSP - overlapping encryption keys detected RuleID : 15453 - Revision : 16 - Type : OS-WINDOWS |
2014-01-10 | Web-based NTLM replay attack attempt RuleID : 15124 - Revision : 17 - Type : OS-WINDOWS |
2014-01-10 | possible SMB replay attempt - overlapping encryption keys detected RuleID : 15009 - Revision : 22 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-13 | Name : It is possible to execute arbitrary code on the remote Windows host due to fl... File : smb_kb971468.nasl - Type : ACT_GATHER_INFO |
2010-02-09 | Name : It is possible to execute arbitrary code on the remote Windows host due to fl... File : smb_nt_ms10-012.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:09:25 |
|
2024-11-28 12:21:00 |
|
2023-12-07 21:28:04 |
|
2021-05-04 12:11:00 |
|
2021-04-22 01:11:34 |
|
2020-05-23 00:25:08 |
|
2018-10-31 00:20:02 |
|
2018-10-13 00:22:53 |
|
2017-09-19 09:23:36 |
|
2016-08-31 12:02:02 |
|
2016-08-05 12:02:23 |
|
2016-06-28 18:00:27 |
|
2016-04-26 19:31:31 |
|
2014-02-17 10:53:26 |
|
2014-01-19 21:26:31 |
|
2013-05-10 23:16:51 |
|