Skip to main content

Microsoft Windows SMB Buffer Underflow Vulnerability( 15 October 2008 )

Last Update Date: 28 Jan 2011 Release Date: 15 Oct 2008 5190 Views

RISK: Medium Risk

A remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol handles specially crafted file names. An attempt to exploit the vulnerability would require authentication because the vulnerable function is only reachable when the share type is a disk, and by default, all disk shares require authentication. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.