Description
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Frederic Deletang · cdoswindows
https://www.exploit-db.com/exploits/21746
References (6)
Scores
EPSS
0.5914
EPSS Percentile
98.2%
Details
Status
published
Products (3)
microsoft/windows_2000
(4 CPE variants)
microsoft/windows_nt
4.0 (24 CPE variants)
microsoft/windows_xp
(2 CPE variants)
Published
Sep 24, 2002
Tracked Since
Feb 18, 2026