Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-747q-6v52-9hjf

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability."

Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability."

EPSS

Процентиль: 97%
0.41972
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 16 лет назад

Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability."

EPSS

Процентиль: 97%
0.41972
Средний

Дефекты

CWE-119