Executive Summary

Summary
Title Vulnerabilities in Distributed File System Could Allow Remote Code Execution (2535512)
Informations
Name MS11-042 First vendor Publication 2011-06-14
Vendor Microsoft Last vendor Modification 2011-06-14
Severity (Vendor) Critical Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical

Revision Note: V1.1 (June 14, 2011): Moved Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems Service Pack 1, Windows Server 2008 R2 for x64-based Systems Service Pack 1, and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 from the affected software table to the non-affected software table. This is an informational change only. There were no changes to the security update files or detection logic.

Summary: This security update resolves two privately reported vulnerabilities in the Microsoft Distributed File System (DFS). The more severe of these vulnerabilities could allow remote code execution when an attacker sends a specially crafted DFS response to a client-initiated DFS request. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms11-042

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11758
 
Oval ID: oval:org.mitre.oval:def:11758
Title: DFS Memory Corruption Vulnerability
Description: The Distributed File System (DFS) implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate fields in DFS responses, which allows remote DFS servers to execute arbitrary code via a crafted response, aka "DFS Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-1868
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12640
 
Oval ID: oval:org.mitre.oval:def:12640
Title: DFS Referral Response Vulnerability
Description: The Distributed File System (DFS) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote DFS servers to cause a denial of service (system hang) via a crafted referral response, aka "DFS Referral Response Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2011-1869
Version: 8
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1
Os 8
Os 2
Os 2

OpenVAS Exploits

Date Description
2011-06-15 Name : Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535...
File : nvt/secpod_ms11-042.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
72929 Microsoft Windows Distributed File System (DFS) Referral Response Handling Re...

72928 Microsoft Windows Distributed File System (DFS) Response Handling Memory Corr...

Information Assurance Vulnerability Management (IAVM)

Date Description
2011-06-16 IAVM : 2011-A-0087 - Microsoft Distributed File System Remote Code Execution Vulnerabilities
Severity : Category I - VMSKEY : V0028593

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows SMB-DS Trans2 Distributed File System response PathConsumed...
RuleID : 19221 - Revision : 15 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows SMB-DS Trans2 Distributed File System response PathConsumed...
RuleID : 19189 - Revision : 13 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2011-06-15 Name : A distributed file system on the remote Windows host has multiple vulnerabili...
File : smb_nt_ms11-042.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 11:46:59
  • Multiple Updates
2014-01-19 21:30:41
  • Multiple Updates
2013-11-11 12:41:23
  • Multiple Updates