(MS09-039) Vulnerabilities in WINS Could Allow Remote Code Execution (969883)
Publish Date: 05 avril 2012
Gravité: : Critique
Identifiant(s) CVE: : CVE-2009-1923,CVE-2009-1924
Date du conseil: 05 avril 2012
Description
This security update addresses two vulnerabilities in the Windows Internet Name Service (WINS). WINS is not installed on any affected operating system by default. Only users who manually installed this component are affected.
The vulnerabilities could allow remote code execution if a user receives a specially crafted WINS replication packet.
Information Exposure Rating:
Trend Micro Deep Security shields the following vulnerabilities using the specified rules. Trend Micro customers using OfficeScan with the Intrusion Defense Firewall plugin are also protected from attacks using these vulnerabilities.
Microsoft Bulletin ID | Vulnerability ID | Rule Number & Title | Deep Security Pattern Version | Deep Security Pattern Release Date |
---|---|---|---|---|
MS09-039 | CVE-2009-1923 | 1004951 - WINS Heap Overflow Vulnerability | Aug 12, 2009 | |
MS09-039 | CVE-2009-1924 | 1004949 - WINS Integer Overflow Vulnerability | Aug 12, 2009 |