CVE-2017-0144
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
6Tags
Description
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Analysis
Windows SMBv1 server contains a remote code execution vulnerability known as 'EternalBlue' that was developed by the NSA, leaked by the Shadow Brokers, and weaponized by WannaCry and NotPetya, causing billions of dollars in global damage.
Technical Context
The vulnerability is a buffer overflow in the SMBv1 transaction handling code. When processing a crafted SMB_COM_TRANSACTION2 request, the srv.sys driver overflows a kernel pool allocation, allowing arbitrary code execution with SYSTEM privileges. No authentication is required; only network access to port 445.
Affected Products
['Microsoft Windows Vista SP2', 'Microsoft Windows 7 SP1', 'Microsoft Windows 8.1', 'Microsoft Windows 10 Gold/1511/1607', 'Microsoft Windows Server 2008/2012/2016', 'Microsoft Windows RT 8.1']
Remediation
Apply MS17-010 immediately. Disable SMBv1 entirely via Windows Features or Group Policy. Block port 445 at network perimeter. SMBv1 should be disabled on ALL systems; SMBv2/v3 provide all necessary functionality.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today