SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows 2000 Kernel Buffer Overflow Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1016658
SecurityTracker URL:  http://securitytracker.com/id/1016658
CVE Reference:   CVE-2006-3444   (Links to External Site)
Updated:  Sep 26 2006
Original Entry Date:  Aug 8 2006
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000
Description:   A vulnerability was reported in Windows Kernel. A local user can obtain elevated privileges on the target system.

The kernel does not properly validate certain system inputs. A local user can trigger a buffer overflow to execute arbitrary code on the target system.

Microsoft indicates that this vulnerability has been publicly disclosed.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued the following fix:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=08806182-6a26-4663-91ea-179817350a91

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms06-049.mspx

The original fix contained a known data integrity issue, as documented in:

http://support.microsoft.com/kb/920958

When MS06-049 is installed on an NTFS formatted drive and NTFS compression is enabled for individual folders, data corruption may occur.

On September 26, 2006, Microsoft reissued MS06-049 to correct system integrity issues with the previous version of the patch. Affected users should reapply the update [which uses the same URL as the original update].

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms06-049.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC