Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-0660 | First vendor Publication | 2011-04-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0660 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11995 | |||
Oval ID: | oval:org.mitre.oval:def:11995 | ||
Title: | SMB Client Response Parsing Vulnerability | ||
Description: | The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-0660 | Version: | 7 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-03-06 | Name : Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability File : nvt/secpod_ms11-020_remote.nasl |
2011-04-13 | Name : Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455) File : nvt/secpod_ms11-019.nasl |
2011-02-18 | Name : Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vuln... File : nvt/gb_ms_windows2k3_active_directory_bof_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71772 | Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution Microsoft Windows contains a flaw related to the Microsoft Server Message Block's validation of SMB responses. This may allow a remote attacker to use a crafted SBM response to execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows 2003 browser election remote heap overflow attempt RuleID : 18994 - Revision : 8 - Type : OS-WINDOWS |
2015-05-28 | Microsoft SMB CIFS split response message overflow attempt RuleID : 18677 - Revision : 3 - Type : SPECIFIC-THREATS |
2015-05-28 | Common Internet File System Browser Protocol BowserWriteErrorLogEntry RuleID : 18653 - Revision : 4 - Type : NETBIOS |
2014-01-10 | Microsoft Windows 2003 browser election remote heap overflow attempt RuleID : 18462 - Revision : 10 - Type : OS-WINDOWS |
2014-01-10 | SMB client TRANS response ring0 remote code execution attempt RuleID : 16531 - Revision : 11 - Type : NETBIOS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-04-13 | Name : Arbitrary code can be executed on the remote host through the installed SMB c... File : smb_nt_ms11-019.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:05:28 |
|
2024-11-28 12:24:47 |
|
2024-08-02 01:04:22 |
|
2024-02-02 01:15:23 |
|
2024-02-01 12:04:17 |
|
2023-12-07 21:28:03 |
|
2023-09-05 12:14:23 |
|
2023-09-05 01:04:08 |
|
2023-09-02 12:14:26 |
|
2023-09-02 01:04:12 |
|
2023-08-12 12:17:22 |
|
2023-08-12 01:04:12 |
|
2023-08-11 12:14:31 |
|
2023-08-11 01:04:20 |
|
2023-08-06 12:13:57 |
|
2023-08-06 01:04:13 |
|
2023-08-04 12:14:02 |
|
2023-08-04 01:04:14 |
|
2023-07-14 12:14:00 |
|
2023-07-14 01:04:12 |
|
2023-03-29 01:15:56 |
|
2023-03-28 12:04:18 |
|
2022-10-11 12:12:29 |
|
2022-10-11 01:03:58 |
|
2021-05-04 12:13:58 |
|
2021-04-22 01:15:08 |
|
2020-09-28 17:22:42 |
|
2020-05-23 00:27:46 |
|
2019-05-09 12:03:40 |
|
2019-02-26 17:19:34 |
|
2018-10-31 00:20:11 |
|
2018-10-13 00:23:03 |
|
2017-09-19 09:24:13 |
|
2016-09-30 01:02:48 |
|
2016-08-31 12:02:33 |
|
2016-08-05 12:02:53 |
|
2016-06-28 18:32:48 |
|
2016-04-26 20:32:28 |
|
2015-05-28 21:26:31 |
|
2014-02-17 11:00:23 |
|
2014-01-19 21:27:35 |
|
2013-05-10 22:54:24 |
|