The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote malicious users to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 2000 |
||
microsoft windows 2003 server enterprise |
||
microsoft windows 2003 server enterprise_64-bit |
||
microsoft windows nt 4.0 |
||
microsoft windows 2003 server standard |
||
microsoft windows 2003 server web |
||
microsoft windows 2003 server 2000 |
||
microsoft windows 2003 server 2003 |
||
microsoft windows 2003 server r2 |