Microsoft Windows SMB Tree Connect Response memory corruption vulnerability

Discussion in 'other security issues & news' started by ronjor, Feb 2, 2017.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,767
    Location:
    Texas
    Original Release date: 02 Feb 2017 | Last revised: 02 Feb 2017
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    https://arstechnica.com/security/20...ofts-0day-exploit-communications-we-all-lose/
     
  3. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,551
    Location:
    Triassic
    This vulnerability just applies to Enterprise servers. This is how I read it.

    It is up to the IT Specialists to deal with specific SMB versions they use. I read the Technet article and that how it reads to me.

    Seems after 50 years in business, MS would have handled this situation a lot better. This is now the talking point rather than the status of the exploit.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    https://threatpost.com/unpatched-smb-zero-day-easily-exploitable
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    If you have a firewall with IDS protection such as Eset's, just disable anything to do with SMB. It's not need for stand-alone PC's.
     
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    http://blog.trendmicro.com/trendlab...ight-due-unpatched-microsoft-vulnerabilities/
     
  7. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,767
    Location:
    Texas
    Microsoft SMBv1 Vulnerability
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.