Академический Документы
Профессиональный Документы
Культура Документы
Traductor de Bing
(https://www.tenable.com)
Indisponible
(https://aka.ms/widget-
retirement)
(http://www.bing.com/translator)
(https://www.facebook.com/microsofttranslator)
Sinopsis
arbitraria de código puede ser ejecutado en el host remoto a través del puerto SMB
Descripción
The remote host is running a version of Microsoft Windows Vista or Windows Server 2008 that contains a
vulnerability in its SMBv2 implementation. An attacker can exploit this flaw to disable the remote host or
to execute arbitrary code on it.
Solution
Microsoft has released a patch for Windows Vista and Windows Server 2008.
See Also
http://www.nessus.org/u?0f72ec72 (http://www.nessus.org/u?0f72ec72)
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-050
(https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-050)
Plugin Details
Severity: Critical
ID: 40887
Version: 1.35
Type: remote
Agent: windows
Published: 2009/09/08
Updated: 2018/11/15
Risk Information
Risk Factor: Critical
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Information
CPE: cpe:/o:microsoft:windows
Exploitable With
CANVAS (CANVAS)
Core Impact
Metasploit (MS09-050 Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference)
Reference Information
CVE: CVE-2009-2532 (/cve/CVE-2009-2532) , CVE-2009-3103 (/cve/CVE-2009-3103)
MSFT: MS09-050
Legal (https://www.tenable.com/legal)