Description
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12724
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-035
Scores
EPSS
0.6918
EPSS Percentile
98.7%
Details
CWE
CWE-20
Status
published
Products (3)
microsoft/windows_server_2003
microsoft/windows_server_2008
(4 CPE variants)
microsoft/windows_server_2008
r2
Published
May 13, 2011
Tracked Since
Feb 18, 2026