SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
SecurityTracker Alert ID:  1011645
SecurityTracker URL:  http://securitytracker.com/id/1011645
CVE Reference:   CVE-2004-0207, CVE-2004-0208, CVE-2004-0209, CVE-2004-0211   (Links to External Site)
Date:  Oct 12 2004
Impact:   Denial of service via local system, Execution of arbitrary code via local system, Execution of arbitrary code via network, Modification of system information, Root access via local system, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Windows NT 4 SP6 and SP6a, 2000 SP3 and SP4, 2003, and XP SP1
Description:   Several vulnerabilities were reported in various components of Microsoft's operating systems. A remote user can execute arbitrary code on the target system. A local user can gain elevated privileges. A local user can cause denial of service conditions.

Microsoft reported that a local user can exploit a flaw in several Window Management application programming interfaces (APIs) to take full control of the target system [CVE: CVE-2004-0207]. The affected APIs allow a local user to modify the properties of an application that is running at a higher privilege level. As a result, the local user can gain the privileges of the target application.

Microsoft credits Brett Moore of Security-Assessment.com with reporting this flaw.

It is also reported that the Virtual DOS Machine (VDM) subsystem allows a local user to take full control of the operating system [CVE: CVE-2004-0208].

Microsoft credits eEye Digital Security with reporting this flaw.

It is also reported that a remote user can create a specially crafted Windows Metafile (WMF) or Enhanced Metafile (EMF) image that, when rendered on the target user's system, will execute arbitrary code [CVE: CVE-2004-0209]. The flaw resides in the processing of these image formats in the Graphics Rendering Engine.

Microsoft credits Patrick Porlan and also Mark Russinovich of Winternals Software with reporting this vulnerability.

It is also reported that the Windows kernel does not properly reset some values within certain CPU data structures [CVE: CVE-2004-0211]. A local user can execute code to exploit this flaw and cause the operating system to stop responding.

Microsoft credits hlt with reporting this flaw.

Impact:   A remote user can execute arbitrary code on the target system with System level privileges.

A local user can gain elevated privileges.

A local user can cause the system to stop responding.

Solution:   The vendor has issued a fix.

Microsoft Windows NT Server 4.0 Service Pack 6a:

http://www.microsoft.com/downloads/details.aspx?FamilyId=533AE5CD-74CE-470A-8916-8E358084497C


Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6:

http://www.microsoft.com/downloads/details.aspx?FamilyId=3B871A96-5F64-4432-920F-FA5760DF683A


Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=4A614222-BA0B-4927-856D-D443BBBE1A42


Microsoft Windows XP and Microsoft Windows XP Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=715E985B-7929-4BD5-9564-5CFE7D528398


Microsoft Windows XP 64-Bit Edition Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=99184841-70A8-47C7-9993-44A60E999A40


Microsoft Windows XP 64-Bit Edition Version 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=B4E6BBCF-F5B9-4B2D-8BC4-30911CA4FD9C


Microsoft Windows Server 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=206E9842-997D-45E4-9252-61F3CE5EA66C


Microsoft Windows Server 2003 64-Bit Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=B4E6BBCF-F5B9-4B2D-8BC4-30911CA4FD9C

These patches require a system restart.

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms04-032.mspx (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC