Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-1923
Modified
More InfoOfficial Page
Source-secure@microsoft.com
View Known Exploited Vulnerability (KEV) details
Published At-12 Aug, 2009 | 17:30
Updated At-30 Apr, 2019 | 14:27

Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Microsoft Corporation
microsoft
>>windows_2000>>*
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_2003_server>>-
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_2003_server>>-
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_2003_server>>-
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.us-cert.gov/cas/techalerts/TA09-223A.htmlsecure@microsoft.com
US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-039secure@microsoft.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6410secure@microsoft.com
N/A
Change History
0Changes found

Details not found