SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Drivers Vendors:   Microsoft
Windows Server Service Null Pointer Comparison Lets Remote Users Deny Service
SecurityTracker Alert ID:  1016606
SecurityTracker URL:  http://securitytracker.com/id/1016606
CVE Reference:   CVE-2006-3942   (Links to External Site)
Updated:  Oct 10 2006
Original Entry Date:  Jul 29 2006
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, XP SP2, 2003 SP1; and prior service packs
Description:   A vulnerability was reported in the Windows Server service. A remote user can cause denial of service conditions.

A remote user can send a specially crafted SMB_COM_TRANSACTION SMB message (0x25) that includes a string that is not properly null terminated to trigger a null pointer comparison in the server driver (srv.sys) and cause the target operating system to crash.

Microsoft reports that the vulnerability was not addressed by the update described in Microsoft Security Bulletin MS06-035, but was unrelated to that vulnerability. Microsoft also indicates that the vulnerability impact is limited to a denial of service and does not permit remote code execution.

Gerardo Richarte from Core Security Technologies discovered this vulnerability. The advisory from Core Security Technologies is available at:

http://www.coresecurity.com/common/showdoc.php?idx=562&idxseccion=10

Microsoft credits NS Focus and Ivan Acre of Core Impact with reporting this vulnerability.

Impact:   A remote user can cause the target system to crash.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=2998105d-6796-4e60-8c9c-e8241385f2a9

Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=08ab17b9-149c-44d4-96cf-87a8c6b9dc22

Microsoft Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=433fd0f9-938f-432d-99d4-f41b92235dcf

Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=abad4cc1-4ea6-4051-bc5a-79deb4dbe72b

Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=849eedef-332b-4792-b84e-3750d407a86f

Microsoft Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=31e448f7-298d-417c-a857-1646689e0817

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-063.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-063.mspx (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC