Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-3103

EPSS 92.86% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-3103

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Vista和Windows 7畸形SMB报文远程拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Windows是微软发布的非常流行的操作系统。 Windows Vista捆绑了新版的SMB2,SRV2.SYS驱动没有正确地处理发送给NEGOTIATE PROTOCOL REQUEST功能的畸形SMB头,如果远程攻击者在发送的SMB报文的Process Id High头字段中包含有"&"字符的话,就会在_Smb2ValidateProviderCallback()函数中触发越界内存引用,导致执行任意代码或系统蓝屏死机。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-3103

#POC DescriptionSource LinkShenlong Link
1cve-2009-3103https://github.com/sooklalad/ms09050POC Details
2CVE-2009-3103 ms09-050https://github.com/sec13b/ms09-050_CVE-2009-3103POC Details
3Microsoft Windows - 'srv2.sys' SMB Code Execution (Python) (MS09-050)https://github.com/Sic4rio/CVE-2009-3103---srv2.sys-SMB-Code-Execution-Python-MS09-050-POC Details
4Nonehttps://github.com/nicolasdamians/ms09-050-CVE-2009-3103-exploitPOC Details
5Nonehttps://github.com/afifudinmtop/CVE-2009-3103POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-3103

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-09-08 · 64 CVEs total

CVE-2009-3097HP Performance Insight 信息泄露漏洞
CVE-2008-7176Celina_Jorge FacilCMS目录遍历漏洞
CVE-2008-7179OTManager Cookie Admin/index.php 身份认证绕过漏洞
CVE-2008-7178XOOPS Uploader模块 目录遍历漏洞
CVE-2008-7177NASM 多个缓冲区错误漏洞
CVE-2009-3102zmanda zrm_for_my_sql 输入验证漏洞
CVE-2009-3101Sun Solaris和OpenSolaris 资源管理错误漏洞
CVE-2009-3100Sun Solaris和OpenSolaris拒绝服务攻击漏洞
CVE-2009-3099HP OpenView Operations Manager未明漏洞
CVE-2009-3098HP Operations Dashboard 未明漏洞
CVE-2008-7167Page Manager任意文件上传漏洞
CVE-2009-3096HP Performance Insight 多个未明漏洞
CVE-2009-3095Apache HTTP Server 安全漏洞
CVE-2009-3094Apache 安全漏洞
CVE-2009-3093ASUS WL-500W 无线路由器 未明漏洞
CVE-2009-3092ASUS WL-500W 无线路由器 缓冲区溢出漏洞
CVE-2009-3091ASUS WL-330gE 未明漏洞
CVE-2009-3090IBM Tivoli 目录服务器 未明漏洞
CVE-2009-3089IBM Tivoli 目录服务器 拒绝服务攻击漏洞
CVE-2009-3088ibm tivoli_directory_server 缓冲区溢出漏洞

Showing top 20 of 64 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2009-3103

No comments yet


Leave a comment