Overview
A vulnerability exists in the way the Microsoft Windows browser service handles Browser Election messages.
Description
From Description of the Microsoft Computer Browser Service: "The browser service maintains a list of the domain name or workgroup name the computer is in, and the protocol being used for each computer on the network segment being served by the computer running the browser service. On each network segment, a master browser is elected from the group of computers located on the segment that are running the browser service." |
Impact
Using a specially crafted Browser Election message, an attacker may be able to cause a Denial of Service (DoS) or execute arbitrary code. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/bulletin/MS11-019.mspx
- http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx
- http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx
- http://lists.grok.org.uk/pipermail/full-disclosure/2011-February/079189.html
Acknowledgements
This document was written by David Warren.
Other Information
CVE IDs: | None |
Severity Metric: | 18.73 |
Date Public: | 2011-02-14 |
Date First Published: | 2011-02-16 |
Date Last Updated: | 2011-04-15 14:05 UTC |
Document Revision: | 18 |