[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Remode code execution vulnerability in Microsoft Windows 10 via SMBv3 - CVE-2020-0796

ID: oval:org.secpod.oval:def:61989Date: (C)2020-03-13   (M)2022-10-10
Class: VULNERABILITYFamily: windows




Microsoft is aware of a remote code execution vulnerability in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target SMB Server or SMB Client. To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.

Platform:
Microsoft Windows Server
Microsoft Windows 10
Reference:
CVE-2020-0796
CVE    1
CVE-2020-0796
CPE    6
cpe:/o:microsoft:windows_10:1909
cpe:/o:microsoft:windows_10:1903
cpe:/o:microsoft:windows_10:1909:::x64
cpe:/o:microsoft:windows_10:1909:::x86
...

© SecPod Technologies