The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/15037 | vdb entry |
http://www.ciac.org/ciac/bulletins/o-077.shtml | third party advisory government resource |
http://www.osvdb.org/3903 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A801 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704 | vdb entry signature |
http://www.securityfocus.com/bid/9624 | vdb entry patch vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A802 | vdb entry signature |
http://www.kb.cert.org/vuls/id/445214 | third party advisory us government resource |