漏洞信息详情
Microsoft WINS服务畸形包远程缓冲区溢出漏洞(MS04-006)
- CNNVD编号:CNNVD-200403-024
- 危害等级: 超危
- CVE编号:
CVE-2003-0825
- 漏洞类型:
输入验证错误
- 发布时间:
2004-02-10
- 威胁类型:
远程
- 更新时间:
2019-05-05
- 厂 商:
microsoft - 漏洞来源:
Qualys -
漏洞简介
Microsoft Windows Internet Name Service是Windows Internet名字服务。部分版本的WINS在处理畸形数据包时缺少正确的缓冲区边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以系统权限执行任意指令。漏洞的起因是WINS使用的验证特别创建报文的方法中存在漏洞。在Windows Server 2003中这个漏洞可能允许向WINS服务器发送一系列特别创建报文的攻击者导致服务失效。这最可能导致拒绝服务,必须手动重启服务才能恢复功能。在Windows NT和Windows 2000系统中,也存在着相似的漏洞,可能导致拒绝服务或任意指令执行。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* 在防火墙阻断TCP 42和UDP 137端口。
* 如果不需要的话,删除WINS。
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS04-006)以及相应补丁:
MS04-006:Vulnerability in the Windows Internet Naming Service (WINS) Could Allow Code Execution (830352)
链接:
http://www.microsoft.com/technet/security/bulletin/MS04-006.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS04-006.asp
补丁下载:
Microsoft Windows NT? Server 4.0 Service Pack 6a
http://www.microsoft.com/downloads/details.aspx?FamilyId=67F91E33-E2EC-4CE9-B55B-509240B1A973&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=67F91E33-E2EC-4CE9-B55B-509240B1A973&displaylang=en
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
http://www.microsoft.com/downloads/details.aspx?FamilyId=FCAF39A9-73BD-4B7F-9DC1-ACED9FE61852&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=FCAF39A9-73BD-4B7F-9DC1-ACED9FE61852&displaylang=en
Microsoft Windows 2000 Server Service Pack 2, Microsoft Windows 2000 Server Service Pack 3, Microsoft Windows 2000 Server Service Pack 4
http://www.microsoft.com/downloads/details.aspx?FamilyId=FD38BD3F-2E56-45B8-B8B2-C5C798B0E70D&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=FD38BD3F-2E56-45B8-B8B2-C5C798B0E70D&displaylang=en
Microsoft Windows Server? 2003
http://www.microsoft.com/downloads/details.aspx?FamilyId=AA95192E-5B0B-45F0-B4AE-E228B0625F2D&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=AA95192E-5B0B-45F0-B4AE-E228B0625F2D&displaylang=en
Microsoft Windows Server 2003 64-Bit Edition
http://www.microsoft.com/downloads/details.aspx?FamilyId=6FD30C00-8D60-4CFD-A115-3708138F5B00&displaylang=en” target=”_blank”>
http://www.microsoft.com/downloads/details.aspx?FamilyId=6FD30C00-8D60-4CFD-A115-3708138F5B00&displaylang=en
参考网址
来源:CIAC
链接:http://www.ciac.org/ciac/bulletins/o-077.shtml
来源:CERT-VN
链接:http://www.kb.cert.org/vuls/id/445214
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704
来源:MS
链接:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A802
来源:OSVDB
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A801
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800
来源:BID
链接:http://www.securityfocus.com/bid/9624
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/15037