VID |
26446 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS09-039, 969883) for 'WINS Could Allow Remote Code Execution Vulnerabilities' has not been applied. This update resolves several newly discovered, privately reported and public vulnerabilities.
The remote host has a Windows WINS server installed.
The remote version of this server is vulnerable to two vulnerabilities which may allow an attacker to execute arbitrary code on the remote system: - One heap overflow vulnerability can be exploited by any attacker - One integer overflow vulnerability can be exploited by a WINS replication partner. An attacker may use these flaws to execute arbitrary code on the remote system with SYSTEM privileges.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms09-39mspx
* Platforms Affected: Microsoft Windows 2000 Server SP4 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 x64 SP2 Microsoft Windows Server 2003 SP2(for Itanium) |
Recommendation |
Apply the appropriate patch (969883) for your system, as listed in Microsoft Security Bulletin MS09-039 at http://www.microsoft.com/technet/security/bulletin/ms09-039.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch |
Related URL |
CVE-2008-0015,CVE-2008-0020,CVE-2009-0901,CVE-2009-2493,CVE-2009-2494 (CVE) |
Related URL |
35558,35585,35828,35832,35982 (SecurityFocus) |
Related URL |
(ISS) |
|