Overview
Imported from the upstream repository s4n7h0/NSE. On 10th March 2020, Microsoft published ADV200005, an advisory for a critical RCE vulnerability in Microsoft Server Message Block 3.1.1 (SMBv3). The vulnerability was initially disclosed accidentally by a vendor’s blogpost related to March 2020 Patch Tuesday. The post was later removed by the vendor, but MalwareHunterTeam seized this accidental disclosure on twitter (https://twitter.com/malwrhunterteam/status/1237438376032251904) According to Microsoft, the vulnerability exists in the way the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target SMB Server or SMB Client. To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it. Update (12/03/2020): checks for SMB dialect 3.1.1