WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-035 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12724 - |
Information
Published : 2011-05-13 17:05
Updated : 2024-11-21 01:25
NVD link : CVE-2011-1248
Mitre link : CVE-2011-1248
CVE.ORG link : CVE-2011-1248
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_server_2003
CWE
CWE-20
Improper Input Validation