Korean
<< Back
VID 26108
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (KB870763) for the 'Vulnerability in the WINS' has not been applied.
The Windows Internet Naming Service (WINS) performs resolution of NetBIOS names to IP addresses, and reverse mapping of IP addresses to NetBIOS names. WINS has a feature called WINS replication, which supports the ability to replicate its database to other servers. WINS replication is done on TCP port 42 using a Microsoft proprietary protocol. As part of the replication protocol a pointer is sent from the replication host to the replication clients. An attacker can craft a packet that allows arbitrary memory corruption and leads to execution of memory of the attackers choosing by hijacking this pointer. A remote attacker could send a specially-crafted packet, to hijack the memory pointer and overflow a buffer, allowing the attacker to execute arbitrary code with SYSTEM level privileges on a target WINS server.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms04-045.mspx
http://www.immunitysec.com/downloads/instantanea.pdf
http://support.microsoft.com/kb/890710
http://www.coresecurity.com/products/coreimpact/nov25-2004.php
http://www.securityfocus.com/archive/1/382414
http://lists.immunitysec.com/pipermail/dailydave/2004-November/001193.html
http://xforce.iss.net/xforce/alerts/id/184
http://www.microsoft.com/ntserver/techresources/commnet/WINS/WINSwp98/WINS02-12.asp

* Platforms Affected:
Microsoft Windows NT Server 4.0 SP 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition SP6
Microsoft Windows 2000 Server SP4
Microsoft Windows Server 2003
Recommendation Apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-045 at http://www.microsoft.com/technet/security/bulletin/ms04-045.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.

As a workaround, disable the WINS service if it is not required. or block ports 42/TCP and 42/UDP at your network perimeter to limit exposure to this issue.

To remove WINS, refer to Microsoft Knowledge Base Article - 890710 at http://www.microsoft.com/ntserver/techresources/commnet/WINS/WINSwp98/WINS02-12.asp
Related URL CVE-2004-0893,CVE-2004-0894 (CVE)
Related URL 11913,11914 (SecurityFocus)
Related URL 18339,18340 (ISS)