Microsoft Windows SMB Pool Overflow Remote Code Execution Vulnerability

Microsoft Windows is prone to a remote code-execution vulnerability that affects the Microsoft Server Message Block (SMB) protocol software.

A remote attacker can exploit this issue to execute code with SYSTEM-level privileges. Failed exploit attempts will likely cause denial-of-service conditions.

NOTE: To exploit this issue, an attacker must have read permissions on an SMB share on the target system. By default, Windows XP grants this access; later systems will require the attacker to authenticate to the server, or require the server to be configured in a way to automatically grant read permissions.


 

Privacy Statement
Copyright 2010, SecurityFocus