The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/30584 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/29588 | exploit vdb entry patch |
http://www.us-cert.gov/cas/techalerts/TA08-162B.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5582 | vdb entry signature |
http://www.vupen.com/english/advisories/2008/1781 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-034 | vendor advisory |
http://securitytracker.com/id?1020228 | vdb entry patch |