Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-3103Microsoft Windows Server 2008 vulnerability

CWE-39919 documents8 sources
Severity
10.0CRITICALNVD
EPSS
92.9%
top 0.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 8
Latest updateMay 2

Description

Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-47wf-g7rm-46qq: Array index error in the SMBv2 protocol implementation in srv22022-05-02
VulnCheck
Microsoft Windows SMBv2 srv2.sys Remote Code Execution2009

💥Exploits & PoCs

9
Exploit-DB
Microsoft Windows - 'srv2.sys' SMB Code Execution (Python) (MS09-050)2016-02-26
Exploit-DB
Microsoft Windows - 'srv2.sys' SMB Negotiate ProcessID Function Table Dereference (MS09-050)2010-08-17
Exploit-DB
Microsoft Windows - 'srv2.sys' SMB Negotiate ProcessID Function Table Dereference (MS09-050) (Metasploit)2010-07-03
Exploit-DB
Microsoft Windows - SMB2 Negotiate Protocol '0x72' Response Denial of Service2010-05-07
Exploit-DB
Microsoft Windows 7/2008 R2 - Remote Kernel Crash2009-11-11

🕵️Threat Intelligence

5
Tenable
Using Nessus and Metasploit Together2011-08-08
Tenable
Using Nessus and Metasploit Together2011-08-08
Tenable
Microsoft "Patch Tuesday" - The Aftermath2009-10-19
Tenable
Microsoft "Patch Tuesday" - The Aftermath2009-10-19
Greynoiseio
NoiseLetter March 2025

📄Research Papers

2
arXiv
Tiresias: Predicting Security Events Through Deep Learning2019-05-24
arXiv
Securing The Kernel via Static Binary Rewriting and Program Shepherding2011-05-10