{"id":3132,"date":"2017-06-27T00:30:00","date_gmt":"2017-06-26T22:30:00","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=3132"},"modified":"2024-10-05T18:57:34","modified_gmt":"2024-10-05T16:57:34","slug":"wins-is-legacy-vulnerable-and-should-not-be-deployed","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2017\/06\/27\/wins-is-legacy-vulnerable-and-should-not-be-deployed\/","title":{"rendered":"WINS is legacy and vulnerable, use DNS instead"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"http:\/\/www.borncity.com\/blog\/?p=191680\" target=\"_blank\" rel=\"noopener\">German<\/a>]Today just a short note for Windows Administrators in enterprises. Windows Internet Name Service (WINS) is legacy and contains a vulnerability. Therefore WINS should not be deployed anymore. Switch to DNS instead.<\/p>\n<p><!--more--><\/p>\n<h2>WINS has a DoS vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/bbab6f138ce642578e8c16fdea3526f2\" alt=\"\" width=\"1\" height=\"1\" \/>A few days ago I've published a German blog post <a href=\"http:\/\/www.borncity.com\/blog\/2017\/06\/20\/wins-lcke-in-windows-server-bleibt-ungepatcht\/\">WINS-L\u00fccke in Windows Server bleibt ungepatcht<\/a> (unfortunately I missed to release an English version). Therefore here are the details in brief: Microsoft's implementation of Windows Internet Name Service (WINS) on Windows Server contains a Denial-of-Service vulnerability.<\/p>\n<p>Security researcher from Fortinet has published recently the article <a href=\"https:\/\/blog.fortinet.com\/2017\/06\/14\/wins-server-remote-memory-corruption-vulnerability-in-microsoft-windows-server\" target=\"_blank\" rel=\"noopener\">WINS Server Remote Memory Corruption Vulnerability in Microsoft Windows Server<\/a> with more details of the vulnerability. This vulnerability affects WINS server enabled as a role in Microsoft Windows Server 2008, 2012 and 2016. There is a memory corruption vulnerability, that can be used remotely by an attacker.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20180730105300\/https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/WINS001.png\"><img loading=\"lazy\" decoding=\"async\" title=\"WINS\" src=\"https:\/\/web.archive.org\/web\/20180730105300\/https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/WINS001.png\" alt=\"WINS\" width=\"593\" height=\"445\" \/><\/a><br \/>\n(Source: Fortinet)<\/p>\n<p>But this flaw requires, that WINS is activated on Windows Server as a role and has been configured.<\/p>\n<h2>Microsoft won't patch this vulnerability<\/h2>\n<p>Fortinet's researcher reported this vulnerability to Microsoft in December 2016. Microsoft answered in June 2017:<\/p>\n<blockquote><p>\u201ea fix would require a complete overhaul of the code to be considered comprehensive. The functionality provided by WINS was replaced by DNS and Microsoft has advised customers to migrate away from it.\"<\/p><\/blockquote>\n<p>So in short: Microsoft won't fix that issue and recommend to switch from WINS to Domain Name System (DNS).<\/p>\n<h2>Well, there is an official Microsoft recommendation<\/h2>\n<p>Within a <a href=\"https:\/\/plus.google.com\/107335814602644347513\/posts\/FqX4wcVSbAi\" target=\"_blank\" rel=\"noopener\">Google+ post<\/a> for my German readers I mentioned my blog post and asked, whether WINS is still alive in business environments. Reader Karl Heinz (Quamar) wrote back:<\/p>\n<blockquote><p><em>My experience is, that many enterprises still are using WINS, especially, because <\/em><em>Microsoft hasn't published a recommendation to move from WINS to DNS(Sec)<\/em>.<\/p><\/blockquote>\n<p>Well, a few days later, Karl Heinz added a 2nd comment to my post, mentions, that there is a recommendation, dated 05\/19\/2017, from Microsoft, advising to deactivate WINS and move to DNS. Within <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/technologies\/wins\/wins-top\" target=\"_blank\" rel=\"noopener\">this document<\/a> Microsoft wrote:<\/p>\n<blockquote><p>Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service that maps computer NetBIOS names to IP addresses.<\/p>\n<p>If you do not already have WINS deployed on your network, do not deploy WINS &#8211; instead, deploy Domain Name System (DNS). DNS also provides computer name registration and resolution services, and includes many additional benefits over WINS, such as integration with Active Directory Domain Services.<\/p>\n<p>If you have already deployed WINS on your network, it is recommended that you deploy DNS and then decommission WINS.<\/p><\/blockquote>\n<p>Well, there are no words about the WINS vulnerability I mentioned above. But the recommendation is clear: Deactivate legacy WINS and use Domain Name System (DNS).<\/p>\n<p>Similar articles:<br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20221126164733\/https:\/\/borncity.com\/win\/2017\/06\/17\/semi-annual-update-channel-for-windows-server-2016\/\">Semi annual update channel for Windows Server 2016<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/19\/june-2017-patches-causing-internet-explorer-11-printing-issues\/\">June 2017 Patches causing Internet Explorer 11 printing issues<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/22\/june-2017-security-updates-ie-11-printing-issues-confirmed\/\">June 2017 security updates IE 11 printing issues confirmed<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/24\/fix-kb4032782-for-internet-explorer-11-printing-issues-june-2017\/\">Fix KB4032782 for Internet Explorer 11 printing issues (June 2017)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/17\/outlook-issues-after-june-2017-security-updates\/\">Outlook issues after June 2017 security updates<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/22\/microsoft-security-update-releases-cve-revisions\/\">Microsoft Security Update Releases \u2013 CVE revisions<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/24\/32-tbyte-leak-with-windows-10-source-code-and-more\/\">32 TByte Leak with Windows 10 source code and more?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2017\/06\/24\/microsoft-closes-critical-vulnerability-cve-2017-8558-in-malware-protection-engine-june-23-2017\/\">Microsoft closes critical vulnerability CVE-2017-8558 in Malware Protection Engine (June 23, 2017)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Today just a short note for Windows Administrators in enterprises. Windows Internet Name Service (WINS) is legacy and contains a vulnerability. Therefore WINS should not be deployed anymore. Switch to DNS instead.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[907,65,69,86,194,906],"class_list":["post-3132","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-dns","tag-microsoft","tag-security","tag-vulnerability","tag-windows","tag-wins"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/3132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=3132"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/3132\/revisions"}],"predecessor-version":[{"id":35663,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/3132\/revisions\/35663"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=3132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=3132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=3132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}