Windows Internet Naming Service (WINS) allows remote attackers to cause a denial of service (connectivity loss) or steal credentials via a 1Ch registration that causes WINS to change the domain controller to point to a malicious server. NOTE: this problem may be limited when Windows 95/98 clients are used, or if the primary domain controller becomes unavailable.
References
Link Resource
http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00371.html Broken Link Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0264.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0269.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0271.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0274.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0276.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0289.html Mailing List Third Party Advisory
http://seclists.org/bugtraq/2001/Jan/0298.html Mailing List Third Party Advisory
http://www.securityfocus.com/bid/2221 Third Party Advisory VDB Entry
https://www2.sans.org/reading_room/whitepapers/win2k/185.php Broken Link Exploit
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:23:43

Updated: 2022-10-03T16:23:43

Reserved: 2022-10-03T00:00:00


Link: CVE-1999-1593

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2009-01-15T01:30:00.407

Modified: 2020-01-10T20:07:30.563


Link: CVE-1999-1593

JSON object: View

cve-icon Redhat Information

No data.

CWE