CERTA-2003-AVI-144

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité dans le système de résolution de noms du protocole réseau NetBIOS permet à un utilisateur mal intentionné d'avoir accès à des informations résidant dans la mémoire de la machine victime.

Description

NetBIOS (Network Basic Input/Output) est un protocole réseau qui peut fonctionner au dessus du protocole TCP : NetBT (NetBIOS over TCP). NBNS (NetBT Name Service) est un service permettant la résolution de noms NetBIOS (équivalent au service DNS pour le protocole TCP). Dans certaines conditions, une réponse NBNS peut contenir des données issues de la mémoire, en plus de la réponse légitime.

Solution

Appliquer le correctif proposé par Microsoft.

None
Impacted products
Vendor Product Description
Microsoft Windows Microsoft Windows XP ;
Microsoft Windows Microsoft Windows Server 2003.
Microsoft Windows Microsoft Windows 2000 ;
Microsoft Windows Microsoft Windows NT 4.0 Server ;
Microsoft Windows Microsoft Windows NT 4.0, Terminal Server Edition ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Microsoft Windows XP ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Windows Server 2003.",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Windows 2000 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Windows NT 4.0 Server ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Windows NT 4.0, Terminal Server Edition ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nNetBIOS (Network Basic Input/Output) est un protocole r\u00e9seau qui peut\nfonctionner au dessus du protocole TCP : NetBT (NetBIOS over TCP). NBNS\n(NetBT Name Service) est un service permettant la r\u00e9solution de noms\nNetBIOS (\u00e9quivalent au service DNS pour le protocole TCP). Dans\ncertaines conditions, une r\u00e9ponse NBNS peut contenir des donn\u00e9es issues\nde la m\u00e9moire, en plus de la r\u00e9ponse l\u00e9gitime.\n\n## Solution\n\nAppliquer le correctif propos\u00e9 par Microsoft.\n",
  "cves": [],
  "links": [],
  "reference": "CERTA-2003-AVI-144",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-09-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Divulgation d\u0027informations"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le syst\u00e8me de r\u00e9solution de noms du protocole\nr\u00e9seau NetBIOS permet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027avoir acc\u00e8s \u00e0\ndes informations r\u00e9sidant dans la m\u00e9moire de la machine victime.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de NetBIOS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 Microsoft MS03-034",
      "url": "http://www.microsoft.com/technet/security/bulletin/MS03-034.asp"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…