CVE-2011-1248

Current Description

WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."

Basic Data

PublishedMay 13, 2011
Last ModifiedFebruary 26, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score9.3
SeverityHIGH
Exploitability Score8.6
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows Server 2003*sp2******
    2.3OSMicrosoftWindows Server 2008**x32*****
    2.3OSMicrosoftWindows Server 2008*sp2x32*****
    2.3OSMicrosoftWindows Server 2008*sp2x64*****
    2.3OSMicrosoftWindows Server 2008-*x64*****
    2.3OSMicrosoftWindows Server 2008r2*x64*****
    2.3OSMicrosoftWindows Server 2008r2sp1x64*****

Vulnerable Software List

VendorProductVersions
Microsoft Windows Server 2003 *
Microsoft Windows Server 2008 *, -, r2

References

NameSourceURLTags
MS11-035https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-035MS
oval:org.mitre.oval:def:12724https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12724OVAL