Microsoft will likely fix Windows SMB denial-of-service flaw on Patch Tuesday

The vulnerability can be exploited to crash Windows systems

Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers.

The vulnerability was disclosed Thursday when the security researcher who found it posted a proof-of-concept exploit for it on GitHub. There was concern initially that the flaw might also allow for arbitrary code execution and not just denial-of-service, which would have made it critical.

The CERT Coordination Center (CERT/CC) at Carnegie Mellon University at first mentioned arbitrary code execution as a possibility in an advisory released Thursday. However, the organization has since removed that wording from the document and downgraded the flaw's severity score from 10 (critical) to 7.8 (high).

Attackers can exploit the vulnerability by tricking Windows systems to connect to malicious SMB servers that send specially crafted responses. Successful exploitation will result in a crash in the mrxsmb20.sys driver, which will trigger a so-called Blue Screen of Death (BSOD).

There are a number of techniques to force computers to open SMB connections and some require little or no user interaction, CERT/CC warned. The organization confirmed the exploit on Windows 10 and Windows 8.1, as well as Windows Server 2016 and Windows Server 2012 R2.

"Windows is the only platform with a customer commitment to investigate reported security issues, and proactively update impacted devices as soon as possible," a Microsoft representative said via email. "Our standard policy is that on issues of low risk, we remediate that risk via our current Update Tuesday schedule."

Update or Patch Tuesday is the day when Microsoft typically releases security updates for its products. This occurs on the second Tuesday of every month and the next one is scheduled for February 14.

The company sometimes breaks out of this regular patch cycle to release updates for critical and actively exploited vulnerabilities, but this won't likely happen in this case, especially now that the flaw's severity has been decreased and there's apparently no threat of remote code execution.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Lucian Constantin

Lucian Constantin

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?