VID |
26573 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS11-035, 2524426) for 'Vulnerability in WINS Could Allow Remote Code Execution' has not been applied. This security update resolves a privately reported vulnerability in the Windows Internet Name Service (WINS). The vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system. Only customers who manually installed this component are affected by this issue. This security update is rated Critical for servers running supported editions of Windows Server 2003, Windows Server 2008 (except Itanium), and Windows Server 2008 R2 (except Itanium), on which WINS is installed. The security update addresses the vulnerability by correcting a logic error that occurs when buffers are passed as parameters.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms11-035.mspx
* Platforms Affected: Windows Server 2003 SP2 Windows Server 2003 x64 SP2 Windows Server 2003 With SP2 for Itanium-based Systems Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows Server 2008 R2 x64 SP1 |
Recommendation |
Apply the appropriate patch (2524426)for your system, as listed in Microsoft Security Bulletin MS11-035 at http://www.microsoft.com/technet/security/bulletin/ms11-035.mspx -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2011-1248 (CVE) |
Related URL |
47730 (SecurityFocus) |
Related URL |
(ISS) |
|