POC详情: 1be20638726565caadf7a3bb2635b5c05159699a

来源
关联漏洞
标题: 微软 Microsoft SMBv3 缓冲区错误漏洞 (CVE-2020-0796)
描述:Microsoft SMBv3是美国微软(Microsoft)公司的一个为设备提供SMB功能的支持固件。 Microsoft Server Message Block 3.1.1 (SMBv3)版本中存在缓冲区错误漏洞,该漏洞源于SMBv3协议在处理恶意压缩数据包时,进入了错误流程。远程未经身份验证的攻击者可利用该漏洞在应用程序中执行任意代码。以下产品及版本受到影响:Microsoft Windows 10版本1903,Windows Server版本1903,Windows 10版本1909,Windo
描述
Identifying and Mitigating the CVE-2020–0796 flaw in the fly
介绍
# Identifying and Mitigating the CVE-2020–0796 flaw in the fly
CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol, which Microsoft will not address the issue as the part of the March 2020 Tuesday.

## Usage
`python3 cve-2020-0796-scanner.py IP`

## Which devices does the CVE-2020-0796 affect?
![Affected Devices](https://miro.medium.com/max/746/1*SrDVddRM9EgS4X7DCmNIwA.png)

## Packet request negotiate on the SMB protocol 
![packet dump](https://i.imgur.com/PVYrR5w.png)



For further information on the vulnerability how to mitigate it check the post of mine in; https://medium.com/@butrintkomoni/identifying-and-mitigating-the-cve-2020-0796-flaw-in-the-fly-7f2404ebe979
文件快照

[4.0K] /data/pocs/1be20638726565caadf7a3bb2635b5c05159699a ├── [1.1K] cve-2020-0796-scanner.py └── [ 773] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。