Description
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote attackers to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the "Server Message Block Vulnerability," and as demonstrated using Trans2 FIND_FIRST2 responses with large file name length fields.
Published: 2005-02-08
Score: 7.5 High
EPSS: 83.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Microsoft Windows 2000 Windows 2003 Server Windows Nt Windows Xp
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T20:57:40.752Z

Reserved: 2005-01-11T00:00:00.000Z

Link: CVE-2005-0045

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-05-02T04:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2005-0045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses