CVE-2011-0654
Microsoft Windows Server 2003 - AD BROWSER ELECTION Remote Heap Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
Subdesbordamiento de enteros en la función BowserWriteErrorLogEntry del servicio de navegador Common Internet File System (CIFS) en los archivos Mrxsmb.sys o Bowser.sys en Active Directory en Microsoft Windows XP versiones SP2 y SP3, Windows Server 2003 SP2, Windows Vista versiones SP1 y SP2, Windows Server 2008 versiones Gold, SP2, R2 y R2 SP1, y Windows 7 versiones Gold y SP1 permiten a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo de sistema) por medio de un mensaje malformado de BROWSER ELECTION, lo que conlleva a un desbordamiento del búfer en la región heap de la memoria, también se conoce como "Browser Pool Corruption Vulnerability" Nota: algunos de estos detalles se obtienen de información de terceros.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-01-28 CVE Reserved
- 2011-02-14 First Exploit
- 2011-02-16 CVE Published
- 2024-08-06 CVE Updated
- 2024-10-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (15)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16166 | 2011-02-14 | |
http://www.exploit-db.com/exploits/16166 | 2024-08-06 | |
http://www.securityfocus.com/bid/46360 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43299 | 2019-02-26 | |
http://www.vupen.com/english/advisories/2011/0394 | 2019-02-26 | |
http://www.vupen.com/english/advisories/2011/0938 | 2019-02-26 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019 | 2019-02-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | r2 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | r2, x64 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows 2003 Server Search vendor "Microsoft" for product "Windows 2003 Server" | * | sp2, itanium |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2003 Search vendor "Microsoft" for product "Windows Server 2003" | * | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Server 2003 Search vendor "Microsoft" for product "Windows Server 2003" | * | sp2 |
Affected
|