It's worth following @hackerfantastic (https://twitter.com/hackerfantastic) on twitter at the moment as he's looking through some of the exploits that were dropped along with this documents.
sounds familiar - we found that one 1996 when doing system programming on NT (NuMega SoftIce was your best friend together with material published by Mark Russinovich prior of him working with MS - remember when you were doing e.g. a file system driver at that time there was close to zero documentation by MS and half of what they provided was wrong). Demonstrated then how to use it to log onto remote Windows systems over the I-Net and gain Admin rights. I thought this one with all what was published about it long ago would be well known since.
Astounded that it took so long to fix and that it passed on through generations of Windows version.
Almost certain similar can be said of other low level "bugs".
same result - only one issue like that known to me
So of course I could be wrong and this issue is not the only one in that protocol implementation / sys component(s)
SMB protocol was a well known source of bugs, lots of service packs used to patch this service (funny that it was enabled on network facing machines. I think it was because windows server needed to be ready for every use case. They could have had it easier by having a separate windows product with non essential services disabled by default)
Nope. Why people/companies insist the Microsoft is usable on the open internet today, despite all evidence to the contrary, is beyond me. They are not, and have not been, suitable-for-the-datacenter/internet for well over a decade now. Let the company and its swiss-cheese OS die already.
I sure hope you're not suggesting that Linux and its dozens of critical CVEs each year is better.
Clearly you're talking about running the internet on BSDs, right?
Highlights so far are a 0-day in windows from NT-->2012 which reliably exploits over the SMBv2 port and a bunch of other stuff. (https://twitter.com/hackerfantastic/status/85291588665052774...)