First published: Wed Feb 16 2011(Updated: )
Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows 2003 Server | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows 2003 Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0654 is rated as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2011-0654, apply the latest security updates and patches from Microsoft for affected Windows versions.
CVE-2011-0654 affects Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
CVE-2011-0654 is classified as an integer underflow vulnerability in the CIFS browser service.
Yes, CVE-2011-0654 can be exploited remotely, allowing an attacker to execute arbitrary code.