Korean
<< Back
VID 26446
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS09-039, 969883) for 'WINS Could Allow Remote Code Execution Vulnerabilities' has not been applied. This update resolves several newly discovered, privately reported and public vulnerabilities.

The remote host has a Windows WINS server installed.

The remote version of this server is vulnerable to two vulnerabilities which may allow an attacker to execute arbitrary code on the remote system:
- One heap overflow vulnerability can be exploited by any attacker
- One integer overflow vulnerability can be exploited by a WINS replication partner.
An attacker may use these flaws to execute arbitrary code on the remote system with SYSTEM privileges.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms09-39mspx

* Platforms Affected:
Microsoft Windows 2000 Server SP4
Microsoft Windows Server 2003 SP2
Microsoft Windows Server 2003 x64 SP2
Microsoft Windows Server 2003 SP2(for Itanium)
Recommendation Apply the appropriate patch (969883) for your system, as listed in Microsoft Security Bulletin MS09-039 at http://www.microsoft.com/technet/security/bulletin/ms09-039.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch
Related URL CVE-2008-0015,CVE-2008-0020,CVE-2009-0901,CVE-2009-2493,CVE-2009-2494 (CVE)
Related URL 35558,35585,35828,35832,35982 (SecurityFocus)
Related URL (ISS)