The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."
2010-02-10T18:30:00.877
2025-04-11T00:51:21.963
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2000 | - | Yes |
Operating System | microsoft | windows_server_2003 | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | - | Yes |
Operating System | microsoft | windows_xp | - | Yes |