SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows UPnP (Ssdpsrv, others) Vendors:   Microsoft
Windows XP Universal Plug and Play Lets Remote Users on the Local Subnet Execute Arbitrary Code
SecurityTracker Alert ID:  1017895
SecurityTracker URL:  http://securitytracker.com/id/1017895
CVE Reference:   CVE-2007-1204   (Links to External Site)
Date:  Apr 10 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XP SP2
Description:   A vulnerability was reported in Windows Universal Plug and Play (UPnP). A remote user can execute arbitrary code on the target system.

A remote user on the local subnetwork can send a specially crafted HTTP request to trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service.

Windows 2000, 2003, and Vista are not affected.

Microsoft credits Greg MacManus of iDefense Labs with reporting this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=ecf69778-91f9-498e-a8bd-35208aa93051

Microsoft Windows XP Professional x64 Edition and Microsoft Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=6ceb5b4f-861f-4f37-b4bc-e8a56382b833

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms07-019.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms07-019.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC