HTTP: Microsoft Windows LSASS Domain Name Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Microsoft Windows LSASS Service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Microsoft Windows LSASS Service.

Extended Description

The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."

Affected Products

Microsoft windows_xp

References

CVE: CVE-2011-0039

Short Name
HTTP:STC:DL:MS-LSASS-DNAME-BOV
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2011-0039 Domain LSASS Microsoft Name Overflow Windows
Release Date
09/26/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.2

Found a potential security threat?