The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/6367 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-070 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10843 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A277 - |
Information
Published : 2002-12-23 05:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-1256
Mitre link : CVE-2002-1256
CVE.ORG link : CVE-2002-1256
JSON object : View
Products Affected
microsoft
- windows_2000_terminal_services
- windows_2000
- windows_xp
CWE