The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
21 Nov 2024, 03:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/96703 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory | |
References | () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0143 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43970/ - Exploit, Third Party Advisory, VDB Entry |
25 Jul 2024, 14:00
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Philips intellispace Portal
Siemens acuson P300 Siemens syngo Sc2000 Siemens acuson Sc2000 Firmware Siemens acuson P300 Firmware Siemens syngo Sc2000 Firmware Siemens tissue Preparation System Firmware Siemens tissue Preparation System Siemens versant Kpcr Sample Prep Firmware Siemens acuson Sc2000 Siemens acuson P500 Firmware Siemens Siemens versant Kpcr Sample Prep Siemens acuson P500 Siemens acuson X700 Microsoft windows 10 1511 Siemens versant Kpcr Molecular System Firmware Siemens versant Kpcr Molecular System Philips Microsoft windows 10 1507 Microsoft windows 10 1607 Siemens acuson X700 Firmware |
|
CPE | cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* |
cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:* cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:* cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:* cpe:2.3:a:philips:intellispace_portal:8.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:philips:intellispace_portal:7.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:* cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:* cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:* cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:* cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:* |
References | () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/96703 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory | |
References | () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0143 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43970/ - Exploit, Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
Information
Published : 2017-03-17 00:59
Updated : 2024-11-21 03:02
NVD link : CVE-2017-0143
Mitre link : CVE-2017-0143
CVE.ORG link : CVE-2017-0143
JSON object : View
Products Affected
siemens
- acuson_p500_firmware
- acuson_sc2000_firmware
- syngo_sc2000
- tissue_preparation_system_firmware
- versant_kpcr_sample_prep_firmware
- acuson_p500
- acuson_p300
- versant_kpcr_molecular_system_firmware
- tissue_preparation_system
- versant_kpcr_molecular_system
- versant_kpcr_sample_prep
- acuson_sc2000
- acuson_x700
- syngo_sc2000_firmware
- acuson_x700_firmware
- acuson_p300_firmware
microsoft
- windows_rt_8.1
- windows_10_1607
- windows_server_2012
- server_message_block
- windows_server_2008
- windows_10_1511
- windows_vista
- windows_7
- windows_8.1
- windows_10_1507
- windows_server_2016
philips
- intellispace_portal
CWE