Description
The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not use a sufficient source of entropy, which allows remote attackers to obtain access to files and other SMB resources via a large number of authentication requests, related to server-generated challenges, certain "duplicate values," and spoofing of an authentication token, aka "SMB NTLM Authentication Lack of Entropy Vulnerability."
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Hernan Ochoa · textremotewindows
https://www.exploit-db.com/exploits/15266
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7751
US Government Resource third-party-advisory
x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA10-040A.html
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-012
Scores
EPSS
0.5521
EPSS Percentile
98.1%
Details
CWE
CWE-264
CWE-310
Status
published
Products (6)
microsoft/windows_2000
microsoft/windows_2003_server
(3 CPE variants)
microsoft/windows_7
microsoft/windows_server_2008
(8 CPE variants)
microsoft/windows_vista
(4 CPE variants)
microsoft/windows_xp
(4 CPE variants)
Published
Feb 10, 2010
Tracked Since
Feb 18, 2026