Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> NetBIOS Name Service Reply Information Leakage


Vulnerability Assessment Details

NetBIOS Name Service Reply Information Leakage

Vulnerability Assessment Summary
Tests the NetBT NS mem disclosure

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of the NetBT name service which
suffers from a memory disclosure problem.

A possible hacker may send a special packet to the remote NetBT name
service, and the reply will contain random arbitrary data from the
remote host memory. This arbitrary data may be a fragment from the
web page the remote user is viewing, or something more serious like a
POP password or anything else.

A possible hacker may use this flaw to continuously 'poll' the content of
the memory of the remote host and might be able to obtain sensitive
information.


Solution : See http://www.microsoft.com/technet/security/bulletin/ms03-034.mspx
Network Security Threat Level: Medium

Networks Security ID: 8532

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Tenable Network Security

Cables, Connectors

Knoppix 9.1.0 (i486) DVD
$2.29
Knoppix 9.1.0 (i486) DVD pictureKnoppix V3.2 Linux CD Bootable Operating System Data Rcovery Tool
$8.0
Knoppix V3.2 Linux CD Bootable Operating System Data Rcovery Tool pictureKnoppix Linux 9.1 LIVE 32GB bootable USB 3.1/3.0/2.0 w/ PERSISTENCE
$18.0
Knoppix Linux 9.1 LIVE 32GB bootable USB 3.1/3.0/2.0 w/ PERSISTENCE pictureKnoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
$19.75
Knoppix Linux Bootable OS v8.6


Discussions

No Discussions have been posted on this vulnerability.