Korean
<< Back
VID 26591
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS11-070, 2571621) for 'Vulnerability in WINS Could Allow Elevation of Privilege' has not been applied.
This security update resolves a privately reported vulnerability in the Windows Internet Name Service (WINS). The vulnerability could allow elevation of privilege if a user received a specially crafted WINS replication packet on an affected system running the WINS service. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. This security update is rated Important for servers running supported editions of Windows Server 2003, Windows Server 2008 (except Itanium), and Windows Server 2008 R2 (except Itanium), on which WINS is installed. The security update addresses the vulnerability by correcting the way WINS handles internal communication on the loopback address.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://technet.microsoft.com/en-us/security/bulletin/ms11-070

* Platforms Affected:
Windows Server 2003 SP2
Windows Server 2003 x64 SP2
Windows Server 2003 With SP2 for Itanium-based Systems
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows Server 2008 R2 x64 SP1
Recommendation Apply the appropriate patch (2571621)for your system, as listed in Microsoft Security Bulletin MS11-070 at http://technet.microsoft.com/ko-kr/security/bulletin/ms11-070
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2011-1984 (CVE)
Related URL 49515 (SecurityFocus)
Related URL (ISS)