CVE-2011-0654

Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html
http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx
http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx
http://secunia.com/advisories/43299 Vendor Advisory
http://www.exploit-db.com/exploits/16166 Exploit
http://www.kb.cert.org/vuls/id/323172 US Government Resource
http://www.securityfocus.com/bid/46360 Exploit
http://www.securitytracker.com/id?1025328
http://www.us-cert.gov/cas/techalerts/TA11-102A.html US Government Resource
http://www.vupen.com/english/advisories/2011/0394 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0938 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019
https://exchange.xforce.ibmcloud.com/vulnerabilities/65376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637
http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html
http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx
http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx
http://secunia.com/advisories/43299 Vendor Advisory
http://www.exploit-db.com/exploits/16166 Exploit
http://www.kb.cert.org/vuls/id/323172 US Government Resource
http://www.securityfocus.com/bid/46360 Exploit
http://www.securitytracker.com/id?1025328
http://www.us-cert.gov/cas/techalerts/TA11-102A.html US Government Resource
http://www.vupen.com/english/advisories/2011/0394 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0938 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019
https://exchange.xforce.ibmcloud.com/vulnerabilities/65376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:r2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*

History

21 Nov 2024, 01:24

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html - () http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html -
References () http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx - () http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx -
References () http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx - () http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx -
References () http://secunia.com/advisories/43299 - Vendor Advisory () http://secunia.com/advisories/43299 - Vendor Advisory
References () http://www.exploit-db.com/exploits/16166 - Exploit () http://www.exploit-db.com/exploits/16166 - Exploit
References () http://www.kb.cert.org/vuls/id/323172 - US Government Resource () http://www.kb.cert.org/vuls/id/323172 - US Government Resource
References () http://www.securityfocus.com/bid/46360 - Exploit () http://www.securityfocus.com/bid/46360 - Exploit
References () http://www.securitytracker.com/id?1025328 - () http://www.securitytracker.com/id?1025328 -
References () http://www.us-cert.gov/cas/techalerts/TA11-102A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA11-102A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2011/0394 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0394 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0938 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0938 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65376 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65376 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637 -

Information

Published : 2011-02-16 01:00

Updated : 2024-11-21 01:24


NVD link : CVE-2011-0654

Mitre link : CVE-2011-0654

CVE.ORG link : CVE-2011-0654


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • windows_2003_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer