{"id":110923,"date":"2020-11-10T10:29:55","date_gmt":"2020-11-10T18:29:55","guid":{"rendered":"\/blogs\/?p=110923"},"modified":"2024-02-16T11:15:05","modified_gmt":"2024-02-16T19:15:05","slug":"cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/","title":{"rendered":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server"},"content":{"rendered":"<h4><b><span data-contrast=\"auto\">CVSS Score:<\/span><\/b><span data-contrast=\"auto\"> 9<\/span><span data-contrast=\"auto\">.8<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<h4><b><span data-contrast=\"auto\">Vector:<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">CVSS:3.0\/<\/span><span data-contrast=\"auto\">AV:N<\/span><span data-contrast=\"auto\">\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h4>\n<h2><b><span data-contrast=\"auto\">Overview<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Microsoft released a patch today for a critical vulnerability<\/span><span data-contrast=\"auto\">\u00a0(CVE-2020-17051)<\/span><span data-contrast=\"auto\">\u00a0in the Windows\u00a0<\/span><a href=\"https:\/\/tools.ietf.org\/html\/rfc1813\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">NFSv3<\/span><\/a><span data-contrast=\"auto\">\u00a0(Network File System)\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">erver.\u00a0<\/span><span data-contrast=\"auto\">NFS is typically used in heterogenous environments of Windows and Unix\/Linux for file sharing.\u00a0<\/span><span data-contrast=\"auto\">The vulnerability can be reproduced to<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">cause<\/span><span data-contrast=\"auto\">\u00a0an\u00a0<\/span><span data-contrast=\"auto\">immediate BSOD (Blue Screen of Death)<\/span><span data-contrast=\"auto\">\u00a0within the nfssvr.sys driver.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Interestingly, the November patches from Microsoft also include a\u00a0<\/span><span data-contrast=\"auto\">remote kernel data read vulnerability<\/span><span data-contrast=\"auto\">\u00a0in the same nfssvr.sys driver<\/span><span data-contrast=\"auto\">\u00a0(<\/span><span data-contrast=\"auto\">CVE-2020-1705<\/span><span data-contrast=\"auto\">6<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">, which leads to\u00a0<\/span><span data-contrast=\"auto\">a potential ASLR (addre<\/span><span data-contrast=\"auto\">ss space\u00a0<\/span><span data-contrast=\"auto\">layout\u00a0<\/span><span data-contrast=\"auto\">randomization<\/span><span data-contrast=\"auto\">)\u00a0<\/span><span data-contrast=\"auto\">bypass<\/span><span data-contrast=\"auto\">. The combination of these two vulnerabilities dramatically increases\u00a0<\/span><span data-contrast=\"auto\">the likelihood of\u00a0<\/span><span data-contrast=\"auto\">a remote\u00a0<\/span><span data-contrast=\"auto\">exploit\u00a0<\/span><span data-contrast=\"auto\">when used on<\/span><span data-contrast=\"auto\">\u00a0Windows\u00a0<\/span><span data-contrast=\"auto\">S<\/span><span data-contrast=\"auto\">erver\u00a0<\/span><span data-contrast=\"auto\">to bypass\u00a0<\/span><span data-contrast=\"auto\">exploit mitigations<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">CVE-2020-17051\u00a0<\/span><span data-contrast=\"auto\">is the first known vulnerability which has been disclosed within the Windows\u00a0<\/span><span data-contrast=\"auto\">implementation of the\u00a0<\/span><span data-contrast=\"auto\">NFSv3 protocol to the best of our knowledge.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Threat Surface<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The vulnerability is believed to impact all versions of Windows\u00a0<\/span><span data-contrast=\"auto\">Server\u00a0<\/span><span data-contrast=\"auto\">when:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">An<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">authenticated user has\u00a0<\/span><span data-contrast=\"auto\">write<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">access to any NFS share<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">An\u00a0<\/span><span data-contrast=\"auto\">NFS share<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">has been configured with\u00a0<\/span><span data-contrast=\"auto\">anonymous<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">write\u00a0<\/span><span data-contrast=\"auto\">acce<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0(no authentication required)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">A Shodan query reported 38,893 servers with port 2049\u00a0<\/span><span data-contrast=\"auto\">exposed to the internet<\/span><span data-contrast=\"auto\">; however,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">it<\/span><span data-contrast=\"auto\">\u00a0i<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0unknown what percentage\u00a0<\/span><span data-contrast=\"auto\">of these\u00a0<\/span><span data-contrast=\"auto\">servers\u00a0<\/span><span data-contrast=\"auto\">are\u00a0<\/span><span data-contrast=\"auto\">actually NFS<\/span><span data-contrast=\"auto\">\u00a0shares\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"auto\">actual<\/span><span data-contrast=\"auto\">l<\/span><span data-contrast=\"auto\">y\u00a0<\/span><span data-contrast=\"auto\">configured with anonymous\u00a0<\/span><span data-contrast=\"auto\">write\u00a0<\/span><span data-contrast=\"auto\">access.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">The\u00a0<\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1135\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">network share discovery technique<\/span><\/a><span data-contrast=\"auto\">\u00a0is typically used by an adversary within the<\/span><span data-contrast=\"auto\">\u00a0discovery phase of the MITRE ATT&amp;CK framework with the objective to gain further privileges.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">CVE-2020-1705<\/span><span data-contrast=\"auto\">1 would give adversaries the ability to spread\u00a0<\/span><span data-contrast=\"auto\">worm<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">like within heterogenous Windows and Unix\/Linux environments using anonymous write access file shares over NFSv3.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Mitigation<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Patching is always the first and most effective course of action.\u00a0<\/span><span data-contrast=\"auto\">If it\u2019s not possible to\u00a0<\/span><span data-contrast=\"auto\">patch,<\/span><span data-contrast=\"auto\">\u00a0the<\/span><span data-contrast=\"auto\">\u00a0best mitigation is to<\/span><span data-contrast=\"auto\">\u00a0limit Windows\u00a0<\/span><span data-contrast=\"auto\">NFSv3\u00a0<\/span><span data-contrast=\"auto\">server share write access<\/span><span data-contrast=\"auto\">\u00a0internally and block<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">an<\/span><span data-contrast=\"auto\">y<\/span><span data-contrast=\"auto\">\u00a0external access to vulnerable servers.\u00a0<\/span><span data-contrast=\"auto\">For those McAfee customers who are unable to deploy the Windows patch, the following Network Security Platform (NSP) signatures will provide a virtual patch against attempted exploitation of this vulnerability<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">NSP Attack ID: 0x40c01200 &#8211;\u00a0<\/span><span data-contrast=\"auto\">NFS\u00a0<\/span><span data-contrast=\"auto\">Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2020-17051)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical vulnerability\u00a0(CVE-2020-17051)\u00a0in the Windows\u00a0NFSv3\u00a0(Network File System)\u00a0server.\u00a0NFS is typically&#8230;<\/p>\n","protected":false},"author":1061,"featured_media":102607,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5657,5354],"class_list":["post-110923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog<\/title>\n<meta name=\"description\" content=\"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T18:29:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-16T19:15:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Eoin Carroll, Steve Povolny\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@w3knight\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eoin Carroll, Steve Povolny\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\"},\"author\":{\"name\":\"Eoin Carroll\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\"},\"headline\":\"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server\",\"datePublished\":\"2020-11-10T18:29:55+00:00\",\"dateModified\":\"2024-02-16T19:15:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\"},\"wordCount\":392,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\",\"name\":\"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png\",\"datePublished\":\"2020-11-10T18:29:55+00:00\",\"dateModified\":\"2024-02-16T19:15:05+00:00\",\"description\":\"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png\",\"width\":500,\"height\":263},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\",\"name\":\"Eoin Carroll\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"caption\":\"Eoin Carroll\"},\"description\":\"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/\",\"https:\/\/x.com\/w3knight\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog","description":"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog","og_description":"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-11-10T18:29:55+00:00","article_modified_time":"2024-02-16T19:15:05+00:00","og_image":[{"width":500,"height":263,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png","type":"image\/png"}],"author":"Eoin Carroll, Steve Povolny","twitter_card":"summary_large_image","twitter_creator":"@w3knight","twitter_site":"@McAfee","twitter_misc":{"Written by":"Eoin Carroll, Steve Povolny","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/"},"author":{"name":"Eoin Carroll","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d"},"headline":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server","datePublished":"2020-11-10T18:29:55+00:00","dateModified":"2024-02-16T19:15:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/"},"wordCount":392,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/","name":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png","datePublished":"2020-11-10T18:29:55+00:00","dateModified":"2024-02-16T19:15:05+00:00","description":"CVSS Score: 9.8\u00a0 Vector:\u00a0CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H\/E:U\/RL:O\/RC:C\u00a0 Overview\u00a0 Microsoft released a patch today for a critical","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/threat-hunting-1.png","width":500,"height":263},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cve-2020-17051-remote-kernel-heap-overflow-in-nfsv3-windows-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d","name":"Eoin Carroll","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","caption":"Eoin Carroll"},"description":"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.","sameAs":["https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/","https:\/\/x.com\/w3knight"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/110923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=110923"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/110923\/revisions"}],"predecessor-version":[{"id":182778,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/110923\/revisions\/182778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/102607"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=110923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=110923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=110923"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=110923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}