SynopsisArbitrary code can be executed on the remote host.
DescriptionThe remote Windows host has an ASN.1 library that could allow an attacker to execute arbitrary code on this host.
To exploit this flaw, an attacker would need to send a specially crafted ASN.1 encoded packet with improperly advertised lengths.
This particular check sent a malformed NTLM packet and determined that the remote host is not patched.
SolutionMicrosoft has released patches for Windows NT, 2000, XP, and 2003.