| VID |
26101 |
| Severity |
30 |
| Port |
137 |
| Protocol |
UDP |
| Class |
WINS |
| Detailed Description |
The Hotfix (KB830352) for the 'Vulnerability in the WINS' seems not to be installed. The Windows Internet Naming Service (WINS) performs resolution of NetBIOS names to IP addresses, and reverse mapping of IP addresses to NetBIOS names. WINS is vulnerable to a remotely exploitable buffer overflow condition, caused by a vulnerability in the method that WINS uses to validate the length of specially-crafted packets. On Windows Server 2003 this vulnerability could allow an attacker who sent a series of specially-crafted packets to a WINS server to cause the affected service to crash, or possibly execute arbitrary code on the system. On Windows NT and Windows 2000, the nature of the vulnerability is slightly different. WINS will reject the specially-crafted packet and the attack does not result in a denial of service. The vulnerability on these platforms also does not allow code execution.
* References: http://www.microsoft.com/technet/security/bulletin/ms04-006.mspx http://www.kb.cert.org/vuls/id/445214 http://www.ciac.org/ciac/bulletins/o-077.shtml
* Platforms Affected: Microsoft Windows NT Server 4.0 SP 6a Microsoft Windows NT Server 4.0 Terminal Server Edition SP6 Microsoft Windows 2000 SP4 Server Microsoft Windows Server 2003 |
| Recommendation |
Apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-006 at http://www.microsoft.com/technet/security/bulletin/ms04-006.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
| Related URL |
CVE-2003-0825 (CVE) |
| Related URL |
9624 (SecurityFocus) |
| Related URL |
15037 (ISS) |
|