CERT-In Vulnerability Note
CIVN-2004-0066
Vulnerability in Microsoft Corporation WINS Server
Original Issue Date:December 03, 2004
Updated: May 17, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Server
- Microsoft Windows NT 4.0 Server
- Microsoft Windows NT 4.0 Server, Terminal Server Edition
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Enterprise Edition
- Microsoft Windows Server 2003 Standard Edition
- Microsoft Windows Server 2003 Web Edition
Overview
The WINS Windows Internet Name Service replication protocol contains two vulnerabilities that may allow an attacker to gain control of a WINS server. If a remote attacker supplies a specially crafted replication packet to a vulnerable WINS server, that attacker may be able to write arbitrary data to WINS server process memory.
Impact
Successful exploitation of the vulnerability allows execution of arbitrary code.
Description
Association Context Data Remote Memory Corruption Vulnerability
(
CAN-2004-1080
)
A vulnerability has been reported in Microsoft Windows in WINS Server, which could be exploited by a remote attacker by sending specially crafted WINS replication packet resulting in memory corruption. This vulnerability is caused due to an error within WINS during the handling of replication packets. WINS replication is done on TCP port 42 using a Microsoft proprietary protocol. In This protocol a memory pointer is sent from server to client, and the client uses that to communicate with the server. This could be exploited by the attacker by sending a specially crafted packet to control the pointer and eventually write 16 bytes arbitrary code at any location.
Name Validation Vulnerability
(
CAN-2004-0567
)
A vulnerability has been reported in Microsoft Windows in WINS Server, which could be exploited by a remote attacker by sending malicious network packet. This vulnerability is caused due to an unchecked buffer in the handling of the "Name" parameter from certain packets . This could be used by an attacker to cause a buffer overflow and execute arbitrary code on the affected system.
Workaround
- Block TCP port 42 and UDP port 42 at the firewall
- Remove WINS if not required
- Use Internet Protocol security IPsec to help protect traffic between WINS server & replication partners
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS04-045
Vendor Information
Microsoft Corporation
http://www.microsoft.com/technet/security/bulletin/MS04-045.mspx
References
US-CERT Vulnerability Note
http://www.kb.cert.org/vuls/id/145134
Immunitysec
http://www.immunitysec.com/downloads/instantanea.pdf
securityfocus ID 11763
http://www.securityfocus.com/bid/11763/info/
Internet Security Systems Protection Alert
http://xforce.iss.net/xforce/alerts/id/184
Secunia Advisory:SA13466
http://secunia.com/advisories/13466/
CVE Name
CAN-2004-1080
CAN-2004-0567
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|