The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate fields in SMB transaction responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Transaction Vulnerability."
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-07T00:45:11.653Z
Reserved: 2010-01-07T00:00:00
Link: CVE-2010-0270
No data.
Status : Deferred
Published: 2010-04-14T16:00:01.663
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-0270
No data.
OpenCVE Enrichment
No data.
Weaknesses