CVE-2020-0796 (CNNVD-202003-607)
CRITICAL
有利用代码
中文标题:
微软 Microsoft SMBv3 缓冲区错误漏洞
英文标题:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1....
CVSS分数:
10.0
发布时间:
2020-03-12 15:48:18
漏洞类型:
缓冲区错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v6
漏洞描述
中文描述:
Microsoft SMBv3是美国微软(Microsoft)公司的一个为设备提供SMB功能的支持固件。 Microsoft Server Message Block 3.1.1 (SMBv3)版本中存在缓冲区错误漏洞,该漏洞源于SMBv3协议在处理恶意压缩数据包时,进入了错误流程。远程未经身份验证的攻击者可利用该漏洞在应用程序中执行任意代码。以下产品及版本受到影响:Microsoft Windows 10版本1903,Windows Server版本1903,Windows 10版本1909,Windows Server版本1909。
英文描述:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
CWE类型:
CWE-119
标签:
dos
windows
eerykitty
local
Daniel García Gutiérrez
remote
chompie1337
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_32-bit_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for x64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_x64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1903_for_arm64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - | - |
cpe:2.3:a:microsoft:windows_server,_version_1903_(server_core_installation):unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1909 for 32-bit Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1909_for_32-bit_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1909 for x64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1909_for_x64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1909 for ARM64-based Systems | unspecified | - | - |
cpe:2.3:a:microsoft:windows_10_version_1909_for_arm64-based_systems:unspecified:*:*:*:*:*:*:*
|
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - | - |
cpe:2.3:a:microsoft:windows_server,_version_1909_(server_core_installation):unspecified:*:*:*:*:*:*:*
|
| microsoft | windows_10_1903 | - | - | - |
cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*
|
| microsoft | windows_10_1909 | - | - | - |
cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*
|
| microsoft | windows_server_1903 | - | - | - |
cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*
|
| microsoft | windows_server_1909 | - | - | - |
cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
134c704f-9b21-4f2e-91b3-4a467353bcc0
OTHER
nvd.nist.gov
访问
nvd.nist.gov
ExploitDB EDB-48216
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-48216
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2020-0796
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-48267
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-48267
EXPLOIT
exploitdb
访问
exploitdb
ExploitDB EDB-48537
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-48537
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
3.1 (adp)
CRITICAL
10.0
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2020-03-12 15:48:18
修改时间:
2025-10-21 23:35:48
创建时间:
2025-11-11 15:35:56
更新时间:
2025-11-11 16:54:44
利用信息
此漏洞有可利用代码!
利用代码数量:
3
利用来源:
未知
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-0796 |
2025-11-11 15:20:19 | 2025-11-11 07:35:56 |
| NVD | nvd_CVE-2020-0796 |
2025-11-11 14:56:56 | 2025-11-11 07:44:24 |
| CNNVD | cnnvd_CNNVD-202003-607 |
2025-11-11 15:10:23 | 2025-11-11 07:55:46 |
| EXPLOITDB | exploitdb_EDB-48216 |
2025-11-11 15:05:50 | 2025-11-11 08:53:56 |
| EXPLOITDB | exploitdb_EDB-48267 |
2025-11-11 15:05:53 | 2025-11-11 08:54:03 |
| EXPLOITDB | exploitdb_EDB-48537 |
2025-11-11 15:05:57 | 2025-11-11 08:54:44 |
版本与语言
当前版本:
v6
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v6
EXPLOITDB
2025-11-11 16:54:44
references_count: 13 → 15; tags_count: 5 → 7
查看详细变更
- references_count: 13 -> 15
- tags_count: 5 -> 7
v5
EXPLOITDB
2025-11-11 16:54:03
references_count: 11 → 13; tags_count: 3 → 5
查看详细变更
- references_count: 11 -> 13
- tags_count: 3 -> 5
v4
EXPLOITDB
2025-11-11 16:53:56
references_count: 8 → 11; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 8 -> 11
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:55:46
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-202003-607; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202003-607
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:24
affected_products_count: 8 → 12; references_count: 7 → 8; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 8 -> 12
- references_count: 7 -> 8
- data_sources: ['cve'] -> ['cve', 'nvd']