Windows Internet Naming Service (WINS) allows remote attackers to cause a denial of service (connectivity loss) or steal credentials via a 1Ch registration that causes WINS to change the domain controller to point to a malicious server. NOTE: this problem may be limited when Windows 95/98 clients are used, or if the primary domain controller becomes unavailable.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2001/Jan/0271.html | Mailing List Third Party Advisory |
http://seclists.org/bugtraq/2001/Jan/0264.html | Mailing List Third Party Advisory |
http://seclists.org/bugtraq/2001/Jan/0289.html | Mailing List Third Party Advisory |
https://www2.sans.org/reading_room/whitepapers/win2k/185.php | Broken Link Exploit |
http://seclists.org/bugtraq/2001/Jan/0274.html | Mailing List Third Party Advisory |
http://seclists.org/bugtraq/2001/Jan/0269.html | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/2221 | Third Party Advisory VDB Entry |
http://seclists.org/bugtraq/2001/Jan/0298.html | Mailing List Third Party Advisory |
http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00371.html | Broken Link Third Party Advisory |
http://seclists.org/bugtraq/2001/Jan/0276.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-01-14 17:30
Updated : 2020-01-10 12:07
NVD link : CVE-1999-1593
Mitre link : CVE-1999-1593
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
microsoft
- windows_95
- windows_98
- windows_2000