MS.Windows.SMB.Buffer.Underflow
Description
This indicates an attack attempt to exploit a remote Code Execution vulnerability in Microsoft Server Message Block (SMB) Protocol.
The vulnerability is caused by an error when SMB handles a search request with specially crafted file name. It could allow an authenticated remote attacker to execute arbitrary code in Microsoft Windows kernel context.
Affected Products
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Service Pack 3
Microsoft Windows XP Professional x64 Edition
Microsoft Windows XP Professional x64 Edition Service Pack 2
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 Service Pack 2
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows Server 2003 x64 Edition Service Pack 2
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
Microsoft Windows Vista
Microsoft Windows Vista Service Pack 1
Microsoft Windows Vista x64 Edition
Microsoft Windows Vista x64 Edition Service Pack 1
Microsoft Windows Server 2008 for 32-bit Systems*
Microsoft Windows Server 2008 for x64-based Systems*
Microsoft Windows Server 2008 for Itanium-based Systems
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch, available from the web site:
http://www.microsoft.com/technet/security/Bulletin/MS08-063.mspx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |