Vulnerability Description
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows Server 2003 | All versions |
| Microsoft | Windows Server 2008 | All versions |
Related Weaknesses (CWE)
References
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-03
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-03
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2011-1248?
CVE-2011-1248 is a vulnerability with a CVSS score of 9.3 (HIGH). WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a ...
How severe is CVE-2011-1248?
CVE-2011-1248 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1248?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows Server 2003, Microsoft Windows Server 2008.