NETBIOS: WINS Server Replication PTR Attack (UDP)
This signature detects attempts to exploit a known vulnerability in the Microsoft NetBIOS WINS server. Attackers can use a brute-force attack against a WINS server to execute code using SYSTEM privileges. Because the WINS server fails to validate the source IP of connections on UDP port 42 as coming from a configured replication client, attacks are possible from any IP.
Extended Description
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
Affected Products
Microsoft windows_2000
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
10.0