Advisory Details

August 11th, 2009

Microsoft Windows WINS Service Heap Overflow Vulnerability

ZDI-09-053
ZDI-CAN-437

CVE ID CVE-2009-1923
CVSS SCORE
AFFECTED VENDORS Microsoft
Microsoft
AFFECTED PRODUCTS Windows 2003 SP2
Windows 2000 SP4
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['8387']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the WINS.exe process which provides name resolution services for NetBIOS networks. While parsing a push request the WINS service copies packet data to a static heap buffer while within a controlled loop. By providing a specially crafted request an attacker can overflow this heap buffer leading to arbitrary code execution under the SYSTEM context.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/bulletin/MS09-039.mspx
DISCLOSURE TIMELINE
  • 2009-02-24 - Vulnerability reported to vendor
  • 2009-08-11 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES