Fortinet Discovers Microsoft Windows Server WINS Server Remote Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in WINS Server service running in Microsoft Windows Server.
Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service that maps computer NetBIOS names to IP addresses. When WINS servers are deployed on the network, end users can access network resources by name rather than by harder-to-remember IP addresses.
The memory corruption vulnerability exists due to incorrectly handling of multiple pending WINS-Replication sessions. An attacker can exploit this vulnerability to launch denial-of-service attack by sending crafted network packets to crash WINS Server service.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Feb 21, 2017
Microsoft will not patch this vulnerability due to the amount of work that would be required. Instead, Microsoft is recommending users replace WINS with DNS.
Following products are affected by the vulnerability:
Windows Server 2008
Windows Server 2012
Windows Server 2016
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.