CERT Vulnerability Note VU#250635 Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum2 transaction http://www.kb.cert.org/vuls/id/250635
CERT Vulnerability Note VU#342243 Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetShareEnum transaction http://www.kb.cert.org/vuls/id/342243
CERT/CC Vulnerability Note VU#311619 Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum3 transaction http://www.kb.cert.org/vuls/id/311619
CERT/CC Vulnerability Note VU#250635 Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetServerEnum2 transaction http://www.kb.cert.org/vuls/id/250635
CERT/CC Vulnerability Note 2002/08/27 追加 VU#342243 Microsoft Windows Server Message Block (SMB) fails to properly handle SMB_COM_TRANSACTION packets requesting NetShareEnum transaction http://www.kb.cert.org/vuls/id/342243
▽ Windows Windowsのdomain name resolver serviceで、DNSリクエストの領域情報を偽ることにより、DNSキャッシュを悪意のある物にすり替えることができる問題が発見された。この問題により、通信内容が傍受され、情報が漏えいする可能性がある。
CERT 2002/08/30 更新 Microsoft Windows domain name resolver service accepts responses from non-queried DNS servers by default http://www.kb.cert.org/vuls/id/458659