Microsoft WINS服务畸形包远程缓冲区溢出漏洞(MS04-006)

漏洞信息详情

Microsoft WINS服务畸形包远程缓冲区溢出漏洞(MS04-006)

漏洞简介

Microsoft Windows Internet Name Service是Windows Internet名字服务。部分版本的WINS在处理畸形数据包时缺少正确的缓冲区边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以系统权限执行任意指令。漏洞的起因是WINS使用的验证特别创建报文的方法中存在漏洞。在Windows Server 2003中这个漏洞可能允许向WINS服务器发送一系列特别创建报文的攻击者导致服务失效。这最可能导致拒绝服务,必须手动重启服务才能恢复功能。在Windows NT和Windows 2000系统中,也存在着相似的漏洞,可能导致拒绝服务或任意指令执行。

漏洞公告

临时解决方法:

如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* 在防火墙阻断TCP 42和UDP 137端口。

* 如果不需要的话,删除WINS。

厂商补丁:

Microsoft

———

Microsoft已经为此发布了一个安全公告(MS04-006)以及相应补丁:

MS04-006:Vulnerability in the Windows Internet Naming Service (WINS) Could Allow Code Execution (830352)

链接:
http://www.microsoft.com/technet/security/bulletin/MS04-006.asp” target=”_blank”>


http://www.microsoft.com/technet/security/bulletin/MS04-006.asp

补丁下载:

Microsoft Windows NT? Server 4.0 Service Pack 6a


http://www.microsoft.com/downloads/details.aspx?FamilyId=67F91E33-E2EC-4CE9-B55B-509240B1A973&displaylang=en” target=”_blank”>


http://www.microsoft.com/downloads/details.aspx?FamilyId=67F91E33-E2EC-4CE9-B55B-509240B1A973&displaylang=en

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6


http://www.microsoft.com/downloads/details.aspx?FamilyId=FCAF39A9-73BD-4B7F-9DC1-ACED9FE61852&displaylang=en” target=”_blank”>


http://www.microsoft.com/downloads/details.aspx?FamilyId=FCAF39A9-73BD-4B7F-9DC1-ACED9FE61852&displaylang=en

Microsoft Windows 2000 Server Service Pack 2, Microsoft Windows 2000 Server Service Pack 3, Microsoft Windows 2000 Server Service Pack 4


http://www.microsoft.com/downloads/details.aspx?FamilyId=FD38BD3F-2E56-45B8-B8B2-C5C798B0E70D&displaylang=en” target=”_blank”>


http://www.microsoft.com/downloads/details.aspx?FamilyId=FD38BD3F-2E56-45B8-B8B2-C5C798B0E70D&displaylang=en

Microsoft Windows Server? 2003


http://www.microsoft.com/downloads/details.aspx?FamilyId=AA95192E-5B0B-45F0-B4AE-E228B0625F2D&displaylang=en” target=”_blank”>


http://www.microsoft.com/downloads/details.aspx?FamilyId=AA95192E-5B0B-45F0-B4AE-E228B0625F2D&displaylang=en

Microsoft Windows Server 2003 64-Bit Edition


http://www.microsoft.com/downloads/details.aspx?FamilyId=6FD30C00-8D60-4CFD-A115-3708138F5B00&displaylang=en” target=”_blank”>


http://www.microsoft.com/downloads/details.aspx?FamilyId=6FD30C00-8D60-4CFD-A115-3708138F5B00&displaylang=en

参考网址

来源:CIAC

链接:http://www.ciac.org/ciac/bulletins/o-077.shtml

来源:CERT-VN

链接:http://www.kb.cert.org/vuls/id/445214

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704

来源:MS

链接:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A802

来源:OSVDB

链接:http://www.osvdb.org/3903

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A801

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800

来源:BID

链接:http://www.securityfocus.com/bid/9624

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/15037

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享