{"vuid":"VU#311619","idnumber":"311619","name":"Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum3 transaction","keywords":["Microsoft Windows","Server Message Block","SMB","SMB_COM_TRANSACTION","crafted packet","NetServerEnum3 transaction","Max Data Count","Max Param Count","MS02-045","Q326830"],"overview":"Microsoft Server Message Block (SMB) may crash upon receipt of a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum3 transaction. Attackers can use this vulnerability to cause a denial of service.","clean_desc":"SMB is a protocol for sharing data and resources between computers, included in many versions of Microsoft Windows. SMB may crash if it receives a crafted SMB_COM_TRANSACTION packet requesting a NetServerEnum2 transaction. If either the 'Max Param Count' field or 'Max Data Count' field of the packet is set to zero (0), the destination SMB host will crash with a blue screen. This vulnerability can be exploited by both local and remote attackers.","impact":"Remote attackers can cause a denial of service. Attackers may also be able to execute arbitrary code, though this has not been demonstrated or proven.","resolution":"Apply a patch For more information, see: http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS02-045.asp","workarounds":"","sysaffected":"","thanks":"Thanks to Ivan Arce of CORE Security Technologies for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","t","r","e","e","v","i","e","w","/","?","u","r","l","=","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","2","-","0","4","5",".","a","s","p"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-12T17:42:06Z","publicdate":"2002-08-22T00:00:00Z","datefirstpublished":"2002-08-23T14:34:23Z","dateupdated":"2002-08-26T18:22:43Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.86625","cam_scorecurrentwidelyknown":"2.3625","cam_scorecurrentwidelyknownexploited":"3.9375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.86625,"vulnote":null}