Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-1248 | First vendor Publication | 2011-05-13 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1248 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12724 | |||
Oval ID: | oval:org.mitre.oval:def:12724 | ||
Title: | WINS Service Failed Response Vulnerability | ||
Description: | WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-1248 | Version: | 7 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 |
ExploitDB Exploits
id | Description |
---|---|
2011-09-13 | MS WINS ECommEndDlg Input Validation Error |
2011-09-13 | Microsoft WINS Service <= 5.2.3790.4520 Memory Corruption |
OpenVAS Exploits
Date | Description |
---|---|
2011-10-21 | Name : Microsoft Windows WINS Remote Code Execution Vulnerability (2524426) File : nvt/gb_ms11-035_remote.nasl |
2011-05-11 | Name : Microsoft Windows WINS Remote Code Execution Vulnerability (2524426) File : nvt/secpod_ms11-035.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72234 | Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption R... A memory corruption flaw exists in Microsoft Windows. The Windows Internet Name Service reuses certain data structures which contain data controlled by the attacker when handling socket send exceptions, resulting in memory corruption. With a specially crafted replication packet, a remote attacker may cause a LeaveCriticalSection call to operate on a controlled memory location, allowing them to execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft WINS service oversize payload exploit attempt RuleID : 18950 - Revision : 7 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-05-19 | Name : Arbitrary code can be executed on the remote host through Microsoft Windows I... File : wins_ms11-035.nasl - Type : ACT_GATHER_INFO |
2011-05-10 | Name : Arbitrary code can be executed on the remote host through Microsoft Windows I... File : smb_nt_ms11-035.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:05:14 |
|
2024-11-28 12:25:14 |
|
2024-08-02 12:16:12 |
|
2024-08-02 01:04:32 |
|
2024-02-02 01:15:44 |
|
2024-02-01 12:04:26 |
|
2023-09-05 12:14:43 |
|
2023-09-05 01:04:18 |
|
2023-09-02 12:14:46 |
|
2023-09-02 01:04:22 |
|
2023-08-12 12:17:49 |
|
2023-08-12 01:04:23 |
|
2023-08-11 12:14:52 |
|
2023-08-11 01:04:31 |
|
2023-08-06 12:14:17 |
|
2023-08-06 01:04:23 |
|
2023-08-04 12:14:22 |
|
2023-08-04 01:04:25 |
|
2023-07-14 12:14:20 |
|
2023-07-14 01:04:22 |
|
2023-03-29 01:16:16 |
|
2023-03-28 12:04:28 |
|
2022-10-11 12:12:47 |
|
2022-10-11 01:04:08 |
|
2021-05-04 12:14:13 |
|
2021-04-22 01:15:26 |
|
2020-09-28 17:22:42 |
|
2020-05-23 00:28:06 |
|
2019-02-26 17:19:35 |
|
2018-10-13 05:18:30 |
|
2018-09-20 12:08:52 |
|
2017-09-19 09:24:20 |
|
2016-09-30 01:02:54 |
|
2016-08-31 12:02:38 |
|
2016-06-28 18:35:54 |
|
2016-04-26 20:39:11 |
|
2014-02-17 11:01:19 |
|
2014-01-19 21:27:40 |
|
2013-05-10 22:57:11 |
|