Windows Internet Naming Service (WINS) allows remote attackers to cause a denial of service (connectivity loss) or steal credentials via a 1Ch registration that causes WINS to change the domain controller to point to a malicious server. NOTE: this problem may be limited when Windows 95/98 clients are used, or if the primary domain controller becomes unavailable.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00371.html | mailing list third party advisory broken link |
http://seclists.org/bugtraq/2001/Jan/0271.html | third party advisory mailing list |
https://www2.sans.org/reading_room/whitepapers/win2k/185.php | broken link exploit |
http://www.securityfocus.com/bid/2221 | vdb entry third party advisory |
http://seclists.org/bugtraq/2001/Jan/0264.html | third party advisory mailing list |
http://seclists.org/bugtraq/2001/Jan/0298.html | third party advisory mailing list |
http://seclists.org/bugtraq/2001/Jan/0276.html | third party advisory mailing list |
http://seclists.org/bugtraq/2001/Jan/0289.html | third party advisory mailing list |
http://seclists.org/bugtraq/2001/Jan/0274.html | third party advisory mailing list |
http://seclists.org/bugtraq/2001/Jan/0269.html | third party advisory mailing list |