Executive Summary
Summary | |
---|---|
Title | Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) |
Informations | |||
---|---|---|---|
Name | MS07-063 | First vendor Publication | 2007-12-11 |
Vendor | Microsoft | Last vendor Modification | 2007-12-11 |
Severity (Vendor) | Critical | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This important security update resolves a privately reported vulnerability in Server Message Block Version 2 (SMBv2). The vulnerability could allow an attacker to tamper with data transferred via SMBv2, which could allow remote code execution in domain configurations communicating with SMBv2. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/ms07-063.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:4208 | |||
Oval ID: | oval:org.mitre.oval:def:4208 | ||
Title: | Vulnerability in SMBv2 Could Allow Remote Code Execution | ||
Description: | Unspecified vulnerability in Server Message Block Version 2 (SMBv2) signing support in Microsoft Windows Vista allows remote attackers to force signature re-computation and execute arbitrary code via a crafted SMBv2 packet, aka "SMBv2 Signing Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-5351 | Version: | 1 |
Platform(s): | Microsoft Windows Vista | Product(s): | SMBv2 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 |
ExploitDB Exploits
id | Description |
---|---|
2009-09-09 | Windows Vista/7 SMB2.0 Negotiate Protocol Request Remote BSOD Vuln |
OpenVAS Exploits
Date | Description |
---|---|
2011-01-14 | Name : Vulnerability in SMBv2 Could Allow Remote Code Execution (942624) File : nvt/gb_ms07-063.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
39125 | Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2007-12-13 | IAVM : 2007-T-0049 - Microsoft Windows SMBv2 Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0015589 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows SMB SMBv2 protocol negotiation attempt RuleID : 12947 - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows SMB-DS SMBv2 protocol negotiation attempt RuleID : 12946 - Revision : 10 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-01-07 | Name : It is possible to execute arbitrary code on the remote host. File : smb_kb942624.nasl - Type : ACT_GATHER_INFO |
2007-12-11 | Name : It is possible to execute code on the remote host. File : smb_nt_ms07-063.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:48 |
|
2014-01-19 21:30:08 |
|
2013-11-11 12:41:07 |
|
2013-05-11 12:22:04 |
|