CVE-2017-0147

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
References
Link Resource
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/96709 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037991 Broken Link Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 Third Party Advisory US Government Resource
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147 Patch Vendor Advisory
https://www.exploit-db.com/exploits/41891/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41987/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/43970/ Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/96709 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037991 Broken Link Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 Third Party Advisory US Government Resource
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147 Patch Vendor Advisory
https://www.exploit-db.com/exploits/41891/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41987/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/43970/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:02

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/96709 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96709 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory
References () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/43970/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43970/ - Exploit, Third Party Advisory, VDB Entry

02 Jul 2024, 13:00

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 7.5
First Time Siemens acuson Sc2000
Siemens acuson P300
Siemens acuson P500 Firmware
Siemens tissue Preparation System
Siemens
Siemens tissue Preparation System Firmware
Siemens acuson Sc2000 Firmware
Microsoft windows 10 1507
Siemens versant Kpcr Sample Prep
Siemens acuson X700 Firmware
Microsoft windows 10 1607
Siemens syngo Sc2000 Firmware
Siemens versant Kpcr Molecular System
Siemens acuson X700
Siemens syngo Sc2000
Microsoft windows 10 1511
Siemens versant Kpcr Sample Prep Firmware
Siemens versant Kpcr Molecular System Firmware
Siemens acuson P300 Firmware
Siemens acuson P500
References () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - () http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/96709 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96709 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037991 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037991 - Broken Link, Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf - Third Party Advisory
References () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - () https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - Third Party Advisory, US Government Resource
References () https://www.exploit-db.com/exploits/41891/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41891/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41987/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41987/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/43970/ - () https://www.exploit-db.com/exploits/43970/ - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*
cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*
cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*

Information

Published : 2017-03-17 00:59

Updated : 2024-11-21 03:02


NVD link : CVE-2017-0147

Mitre link : CVE-2017-0147

CVE.ORG link : CVE-2017-0147


JSON object : View

Products Affected

siemens

  • acuson_p500_firmware
  • acuson_sc2000_firmware
  • syngo_sc2000
  • tissue_preparation_system_firmware
  • versant_kpcr_sample_prep_firmware
  • acuson_p500
  • acuson_p300
  • versant_kpcr_molecular_system_firmware
  • tissue_preparation_system
  • versant_kpcr_molecular_system
  • versant_kpcr_sample_prep
  • acuson_x700
  • acuson_sc2000
  • syngo_sc2000_firmware
  • acuson_x700_firmware
  • acuson_p300_firmware

microsoft

  • windows_rt_8.1
  • windows_10_1607
  • windows_server_2012
  • windows_server_2008
  • windows_10_1511
  • windows_vista
  • windows_7
  • windows_8.1
  • windows_10_1507
  • windows_server_2016