Arbitrary Code Execution in Microsoft WINS
A vulnerability exists in Microsoft WINS that could result in the remote execution of arbitrary code on the vulnerable system.
November 30, 2004
Reported November 28, 2004, byImmunity
VERSIONS AFFECTED
· Microsoft WINS |
DESCRIPTION
A vulnerability exists in Microsoft WINS that could result in the remote executionof arbitrary code on the vulnerable system. WINS replication is done on TCPport 42 using a Microsoft proprietary protocol. During this protocolflow, a memory pointer is sent from server to client, and the client uses that pointerto talk with the server. If a specially crafted packet is sent to the server,an attacker can control the pointer and can make it point to anattacker-controlled buffer and eventually write 16 bytes at any location.
VENDOR RESPONSE
Microsoft, has released "How to help protect against a WINS securityissue," http://support.microsoft.com/kbid?=890710, to address thisvulnerability.
CREDIT
Discovered by Nicolas Waisman.
Read more about:
MicrosoftAbout the Author
You May Also Like