Follow:

Vulnerability:Win/SMB.DFS.DoS!CVE-2011-1869

Severity rating
Critical

Class/Type
Vulnerability

Discovered date
2011-06-08T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
No

Signature detection
Low



On this page




Description

A denial of service vulnerability exists in the way that Microsoft Distributed File System (DFS) handles specially crafted DFS referral responses. An attempt to exploit the vulnerability would not require authentication, allowing an attacker to exploit the vulnerability by sending a specially crafted network message to a computer running the Server service.



Impact

An attacker who successfully exploited this vulnerability could cause a user's system to stop responding until manually restarted.



Technical details (analysis)

An attacker could host a specially crafted server that is designed to exploit this vulnerability and then convince a user to initiate a DFS connection with it. Additionally, an attacker on the local network could perform a man-in-the-middle attack to respond to a legitimate DFS request with a malformed DFS response.



Affected software

Application 1
Application 2
Application 3



Non-affected software

All applications not on the affected list.



References




Solutions




NIS signature

Name: Vulnerability:Win/SMB.DFS.DoS!CVE-2011-1869
Release Date: 2011-06-08T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

No known work-arounds at this time.