Korean
<< Back
VID 26101
Severity 30
Port 137
Protocol UDP
Class WINS
Detailed Description The Hotfix (KB830352) for the 'Vulnerability in the WINS' seems not to be installed.
The Windows Internet Naming Service (WINS) performs resolution of NetBIOS names to IP addresses, and reverse mapping of IP addresses to NetBIOS names. WINS is vulnerable to a remotely exploitable buffer overflow condition, caused by a vulnerability in the method that WINS uses to validate the length of specially-crafted packets. On Windows Server 2003 this vulnerability could allow an attacker who sent a series of specially-crafted packets to a WINS server to cause the affected service to crash, or possibly execute arbitrary code on the system. On Windows NT and Windows 2000, the nature of the vulnerability is slightly different. WINS will reject the specially-crafted packet and the attack does not result in a denial of service. The vulnerability on these platforms also does not allow code execution.

* References:
http://www.microsoft.com/technet/security/bulletin/ms04-006.mspx
http://www.kb.cert.org/vuls/id/445214
http://www.ciac.org/ciac/bulletins/o-077.shtml

* Platforms Affected:
Microsoft Windows NT Server 4.0 SP 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition SP6
Microsoft Windows 2000 SP4 Server
Microsoft Windows Server 2003
Recommendation Apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-006 at http://www.microsoft.com/technet/security/bulletin/ms04-006.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2003-0825 (CVE)
Related URL 9624 (SecurityFocus)
Related URL 15037 (ISS)