First published: Mon Dec 23 2002(Updated: )
The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2000 | =sp3 | |
Microsoft Windows Terminal Services | ||
Microsoft Windows Terminal Services | =sp1 | |
Microsoft Windows Terminal Services | =sp2 | |
Microsoft Windows Terminal Services | =sp3 | |
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1256 has a moderate severity rating as it allows attackers to inject data into SMB sessions.
To fix CVE-2002-1256, ensure that SMB signing is enabled on your systems and apply the latest security updates.
CVE-2002-1256 affects Microsoft Windows 2000 and Windows XP, including various service pack versions.
CVE-2002-1256 allows attackers to disable SMB digital signing, enabling undetected data injection or modification.
While CVE-2002-1256 primarily affects outdated systems, it remains a threat for any systems still running vulnerable versions of Windows.