{"vuid":"VU#520465","idnumber":"520465","name":"Microsoft SMBv2 signing vulnerability","keywords":["Microsoft","SMBv2 protocol","remote code execution","ms07-dec"],"overview":"A vulnerability in the way Microsoft Server Message Block Version 2 (SMBv2) implements digital signing of packets may allow a remote, unauthenticated attacker to gain local user privileges and execute arbitrary code.","clean_desc":"Microsoft Server Message Block (SMB) Protocol is a network file sharing protocol used by default on Windows based computers. SMBv2 is supported on computers running Windows Server 2008 and Windows Vista. SMBv2 packet signing - used over all SMB communications - is critical for enabling recipients to verify the source and authenticity of the packet. A flaw exists in the way SMBv2 implements packet signing which may allow an attacker to modify a packet in transit, gain local user access to the system and execute arbitrary code.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with local user privileges on an affected system.","resolution":"Microsoft has published Microsoft Security Bulletin MS07-063 in response to this issue. Users are strongly encouraged to review this bulletin and apply the referenced patches.","workarounds":"In addition to the patches referenced above, Microsoft has published workarounds for this issue. Users who are unable to apply the patches are strongly encouraged to implement these workarounds as appropriate.","sysaffected":"","thanks":"This vulnerability was reported by the vendor.","author":"This document was written by Joseph W. Pruszynski.","public":["http://www.microsoft.com/technet/security/bulletin/ms07-063.mspx","http://secunia.com/advisories/27997/"],"cveids":["CVE-2007-5351"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-12-11T19:37:22Z","publicdate":"2007-12-11T00:00:00Z","datefirstpublished":"2007-12-12T20:35:10Z","dateupdated":"2007-12-12T20:35:23Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"14","cam_impact":"13","cam_easeofexploitation":"13","cam_attackeraccessrequired":"17","cam_scorecurrent":"9.04995","cam_scorecurrentwidelyknown":"18.0999","cam_scorecurrentwidelyknownexploited":"33.18315","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.04995,"vulnote":null}