SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Dhcp Vendors:   Microsoft
Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016468
SecurityTracker URL:  http://securitytracker.com/id/1016468
CVE Reference:   CVE-2006-2372   (Links to External Site)
Date:  Jul 11 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Microsoft Windows DHCP client. A remote user can execute arbitrary code on the target system.

The DHCP Client service contains a buffer overflow. A remote user can send specially crafted DHCP data to a target client on the same network segment to trigger the buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service.

Microsoft credits Mariano Nunez Di Croce of Cybsec Security Systems with reporting this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=7a04fae4-6914-4ffa-b0ec-61b912d47873

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=bf08cc28-b359-4b27-99b2-342f832cdecc

Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=49b0da03-73a7-462a-9dc2-2eb5405e2505

Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=2978c3d2-59e3-4dd4-8323-b1b2f9dfa7a5

Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=01e7bbbd-dfb6-4524-aa35-39323b210aa4

Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=d68730a7-bb7c-477a-a2a4-991629fc1402

A restart is required.

The Microsoft bulletin is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-036.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-036.mspx (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC