Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0796 PoC — 微软 Microsoft SMBv3 缓冲区错误漏洞

Source
Associated Vulnerability
Title:微软 Microsoft SMBv3 缓冲区错误漏洞 (CVE-2020-0796)
Description:A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Description
Scanner script to identify hosts vulnerable to CVE-2020-0796
Readme
# SMBCompScan
Scanner script to identify hosts vulnerable to CVE-2020-0796

[Advisory](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796)

## Disclaimer
This script can help to identify machines with the SMBv3 vulnerablity by checking for enabled compression. Still, it might return "vulnerable" for machines which have KB4551762 installed.

## Requirements
* Perl 5.12+
* IO::Socket
* Net::Netmask

## Usage
Scan a single IP address:
```sh
./smbCompScan.pl 192.168.0.1
```

Scan by hostname:
```sh
./smbCompScan.pl some.vulnerable.host.tld
```

Scan a network:
```sh
./smbCompScan.pl 192.168.0.0/24
```
File Snapshot

[4.0K] /data/pocs/f3a36e250e82f0e4ef197aba383ad701ef2647fb ├── [1.0K] LICENSE ├── [ 634] README.md └── [2.6K] smbCompScan.pl 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →