Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (Microsoft)  >   WINS (Windows Internet Name Service) Vendors:   Microsoft
Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012517
SecurityTracker URL:
CVE Reference:   CVE-2004-0567   (Links to External Site)
Date:  Dec 14 2004
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): NT 4.0 SP6a, 2000 SP4, 2003; and prior service packs
Description:   A vulnerability was reported in Microsoft Windows Internet Naming Service (WINS). A remote user can execute arbitrary code on the target system.

The vendor reported that a remote user can send a WINS packet with a specially crafted Name value to trigger a buffer overflow and execute arbitrary code with System level privileges.

Microsoft credits Kostya Kortchinsky from CERT RENATER with reporting this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system with System level privileges.
Solution:   The vendor has released the following fixes.

Microsoft Windows NT Server 4.0 Service Pack 6a:

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6:

Microsoft Windows 2000 Server Service Pack 3 and Microsoft Windows 2000 Server Service Pack 4:

Microsoft Windows Server 2003:

Microsoft Windows Server 2003 64-Bit Edition:

A restart is required in most cases.

Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC