Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-1248

EPSS 69.18% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-1248

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft WINS服务响应失败数据重用漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Internet Name Service(WINS)中存在服务响应失败数据重用漏洞。该漏洞存在于Microsoft Windows 2003 Server的wins.exe服务中。该服务原计划解析NetBIOS请求并接受连接到端口42上,而在处理套接字发送时,产生了逻辑错误,某些用户提供的值仍保留在栈框架中并在另一环境中重新使用。远程攻击者可以利用该漏洞导致LeaveCriticalSection响应,并在SYSTEM用户环境下执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-1248

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-1248

Please Login to view more intelligence information

Same Patch Batch · n/a · 2011-05-13 · 41 CVEs total

CVE-2011-1849HP 3COM/H3C Intelligent Management Center tftpserver WRQ远程代码执行漏洞
CVE-2011-1269Microsoft Office PowerPoint文件解析内存破坏RCE漏洞
CVE-2011-1270Microsoft Office PowerPoint远程代码执行漏洞
CVE-2011-1325Lockon EC-CUBE跨站请求伪造漏洞
CVE-2011-1720Postfix SMTP Server Cyrus SASL认证方法缓冲区溢出漏洞
CVE-2011-1737HP Palm webOS多个跨站脚本攻击漏洞
CVE-2011-1738HP Palm WebOS本地权限提升漏洞
CVE-2011-1772Apache Struts XWork '<s:submit>'错误页面跨站脚本攻击漏洞
CVE-2011-1840MartiniCreations PassmanLite密码管理应用程序敏感信息泄露漏洞
CVE-2011-1848HP 3COM/H3C Intelligent Management Center img.exe组件栈缓冲区溢出漏洞
CVE-2011-0995Novell SUSE Linux Enterprise Server rubygem-sqlite3包权限提升漏洞
CVE-2011-1850HP 3COM/H3C Intelligent Management Center dbman sprintf栈缓冲区溢出漏洞
CVE-2011-1851HP 3COM/H3C Intelligent Management Center tftpserver mode栈缓冲区溢出漏洞
CVE-2011-1852HP 3COM/H3C Intelligent Management Center tftpserver DATA/ERROR栈缓冲区溢出漏洞
CVE-2011-1853HP 3COM/H3C Intelligent Management Center tftpserver opcode_table远程代码执行漏洞
CVE-2011-1854HP 3COM/H3C Intelligent Management Center imcsyslogdm释放后使用漏洞
CVE-2011-1855HP Network Node Manager i数据和日志文件信息泄露漏洞
CVE-2011-2087Apache Struts javatemplates插件组件处理程序多个跨站脚本攻击漏洞
CVE-2011-2088Apache Struts和OpenSymphony WebWork Xwork敏感信息泄露漏洞
CVE-2011-2089ICONICS BizViz和GENESIS32 VersionInfo ActiveX控件栈缓冲区溢出漏洞

Showing top 20 of 41 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2011-1248

No comments yet


Leave a comment