MS.SMB.Server.Memory.Corruption

description-logoDescription

This indicates a possible attack against an unauthenticated remote Code Execution vulnerability in the Microsoft Server Message Block (SMB) Protocol.
The vulnerability is due to improper handling of user supplied input. A remote attacker may exploit this by sending a crafted SMB packet to a vulnerable SMB server. A successful exploit allows execution of arbitrary code.

affected-products-logoAffected Products

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems

Impact logoImpact

System compromise: Remote code execution.

recomended-action-logoRecommended Actions

Please refer to the following Microsoft advisory for the update:
http://www.microsoft.com/technet/security/Bulletin/ms10-054.mspx

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)