CVE-2017-0144

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*

History

24 Jul 2024, 16:03

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo
CVSS v2 : 9.3
v3 : 8.1
v2 : 9.3
v3 : 8.8
References () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/96704 - () http://www.securityfocus.com/bid/96704 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037991 - () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory
References () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144 - Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41891/ - () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41987/ - () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42030/ - () https://www.exploit-db.com/exploits/42030/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42031/ - () https://www.exploit-db.com/exploits/42031/ - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
First Time Siemens acuson P300
Siemens syngo Sc2000
Siemens acuson Sc2000 Firmware
Siemens syngo Sc2000 Firmware
Siemens acuson P300 Firmware
Siemens tissue Preparation System Firmware
Siemens tissue Preparation System
Siemens versant Kpcr Sample Prep Firmware
Siemens acuson Sc2000
Siemens acuson P500 Firmware
Siemens
Siemens versant Kpcr Sample Prep
Siemens acuson P500
Siemens acuson X700
Microsoft windows 10 1511
Siemens versant Kpcr Molecular System Firmware
Siemens versant Kpcr Molecular System
Microsoft windows 10 1507
Microsoft windows 10 1607
Siemens acuson X700 Firmware

Information

Published : 2017-03-17 00:59

Updated : 2024-07-24 16:03


NVD link : CVE-2017-0144

Mitre link : CVE-2017-0144

CVE.ORG link : CVE-2017-0144


JSON object : View

Products Affected

siemens

  • tissue_preparation_system
  • acuson_p300_firmware
  • acuson_p300
  • acuson_p500
  • acuson_sc2000
  • acuson_x700_firmware
  • versant_kpcr_sample_prep_firmware
  • acuson_sc2000_firmware
  • versant_kpcr_sample_prep
  • versant_kpcr_molecular_system
  • syngo_sc2000_firmware
  • tissue_preparation_system_firmware
  • versant_kpcr_molecular_system_firmware
  • acuson_p500_firmware
  • acuson_x700
  • syngo_sc2000

microsoft

  • server_message_block
  • windows_vista
  • windows_server_2008
  • windows_8.1
  • windows_10_1607
  • windows_10_1511
  • windows_rt_8.1
  • windows_10_1507
  • windows_7
  • windows_server_2012
  • windows_server_2016