Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-0045

4 documents4 sources
Severity
7.5HIGH
EPSS
83.9%
top 0.70%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 2
Latest updateMay 1

Description

The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wrr4-g9p3-q8gw: The Server Message Block (SMB) implementation for Windows NT 42022-05-01
CVEList
CVE-2005-0045: The Server Message Block (SMB) implementation for Windows NT 42005-02-08

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - 'SMB' Transaction Response Handling (MS05-011)2005-06-23
CVE-2005-0045 (HIGH CVSS 7.5) | The Server Message Block (SMB) impl | cvebase.io