SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Drivers Vendors:   Microsoft
Windows Server Service Buffer Overflows Let Remote Users View SMB Information and Execute Arbitrary Code
SecurityTracker Alert ID:  1016467
SecurityTracker URL:  http://securitytracker.com/id/1016467
CVE Reference:   CVE-2006-1314, CVE-2006-1315   (Links to External Site)
Date:  Jul 11 2006
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, XP SP2, 2003 SP1; and prior service packs
Description:   A vulnerability was reported in the Windows Server service. A remote user can execute arbitrary code on the target system. A remote user can view information from the target system.

A remote user can send a specially crafted network packet to the Server service to trigger a buffer overflow in the Server driver and execute arbitrary code on the target system. The code will run with System level privileges.

The Server protocol driver does not properly initial a buffer. A remote user can send specially crafted data to the Server service to view fragments of memory used to store Server Message Block (SMB) traffic during transport.

Microsoft credits Pedram Amini of the TippingPoint Security Research Team in collaboration with H D Moore with reporting the Mailslot vulnerability and Nicolas Pouvesle of Tenable Network Security and Mike Price and Rafal Wojtczuk of McAfee Avert Labs with reporting the SMB vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can view portions of SMB buffers.

Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=b207020d-90f7-4c41-8304-06af0ded6467

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=2592a44c-82fb-4ccd-82a6-fcac7ca33172

Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=b0f67167-7ede-4355-af6f-50c6615f6bbd

Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=48f03ad7-38f9-48f4-bbfc-14c52e9c942a

Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=41a4a07f-bea3-48d6-b8d2-d7a5600d7179

Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=dfbf3fa6-9e11-48b4-894d-5436693d17f7

A restart is required.

The Microsoft bulletin is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-035.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-035.mspx (Links to External Site)
Cause:   Access control error, Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC