Short Name |
NETBIOS:NBDS:MS-BROWSER-ELECT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
NETBIOS |
Keywords |
Microsoft Windows BROWSER ELECTION Buffer Overflow |
Release Date |
2011/04/11 |
Update Number |
1900 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known flaw in Microsoft Windows Browser Protocol Handler. It is due to a boundary error in the kernel component of the Windows Browsing service that is responsible for handling the incoming datagrams. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system.
Microsoft Windows is prone to a remote heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. Successful exploits can allow attackers to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.