| Summary | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148. |
|---|---|
| Publication Date | March 17, 2017, 9:59 a.m. |
| Registration Date | Jan. 26, 2021, 1:10 p.m. |
| Last Update | Nov. 21, 2024, 12:02 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:microsoft:server_message_block:1.0:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | ||||
| 8 | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* | ||||
| 9 | cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | ||||
| 10 | cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* | ||||
| 11 | cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* | ||||
| 12 | cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:* | 4.0 | 4.0e | |||
| cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:* | 4.0 | 4.0e | |||
| cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:* | ||||
| Title | 複数の Microsoft Windows 製品の SMBv1 サーバにおける任意のコードを実行される脆弱性 |
|---|---|
| Summary | 複数の Microsoft Windows 製品の SMBv1 サーバには、任意のコードを実行される脆弱性が存在します。 マイクロソフトセキュリティ情報には、この脆弱性は「Windows SMB のリモートでコードが実行される脆弱性」と記載されています。 本脆弱性は、CVE-2017-0143、CVE-2017-0145、CVE-2017-0146、および CVE-2017-0148 とは異なる脆弱性です。 |
| Possible impacts | リモートの攻撃者により、巧妙に細工されたパケットを介して、任意のコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | March 14, 2017, midnight |
| Registration Date | March 22, 2017, 10:39 a.m. |
| Last Update | July 10, 2019, 2:52 p.m. |
| マイクロソフト |
| Microsoft Server Message Block (SMB) 1.0 |
| Microsoft Windows 10 for 32-bit Systems |
| Microsoft Windows 10 for x64-based Systems |
| Microsoft Windows 10 Version 1511 for 32-bit Systems |
| Microsoft Windows 10 Version 1511 for x64-based Systems |
| Microsoft Windows 10 Version 1607 for 32-bit Systems |
| Microsoft Windows 10 Version 1607 for x64-based Systems |
| Microsoft Windows 7 for 32-bit Systems SP1 |
| Microsoft Windows 7 for x64-based Systems SP1 |
| Microsoft Windows 8.1 for 32-bit Systems |
| Microsoft Windows 8.1 for x64-based Systems |
| Microsoft Windows RT 8.1 |
| Microsoft Windows Server 2008 for 32-bit Systems SP2 |
| Microsoft Windows Server 2008 for 32-bit Systems SP2 (Server Core インストール) |
| Microsoft Windows Server 2008 for Itanium-based Systems SP2 |
| Microsoft Windows Server 2008 for x64-based Systems SP2 |
| Microsoft Windows Server 2008 for x64-based Systems SP2 (Server Core インストール) |
| Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 |
| Microsoft Windows Server 2008 R2 for x64-based Systems SP1 |
| Microsoft Windows Server 2008 R2 for x64-based Systems SP1 (Server Core インストール) |
| Microsoft Windows Server 2012 |
| Microsoft Windows Server 2012 (Server Core インストール) |
| Microsoft Windows Server 2012 R2 |
| Microsoft Windows Server 2012 R2 (Server Core インストール) |
| Microsoft Windows Server 2016 for x64-based Systems |
| Microsoft Windows Server 2016 for x64-based Systems (Server Core インストール) |
| Microsoft Windows Vista SP2 |
| Microsoft Windows Vista x64 Edition SP2 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年03月22日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| 1 | [2019年07月10日] 参考情報:ICS-CERT ADVISORY (ICSMA-18-058-02) を追加 |
July 10, 2019, 2:42 p.m. |