SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Schannel Vendors:   Microsoft
Windows Schannel Digital Signature Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018226
SecurityTracker URL:  http://securitytracker.com/id/1018226
CVE Reference:   CVE-2007-2218   (Links to External Site)
Date:  Jun 12 2007
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP2; and prior service packs
Description:   A vulnerability was reported in Windows Schannel. A remote user can cause arbitrary code to be executed on the target user's system.

A remote server can return a specially crafted digital signature to the connected target system via an SSL handshake to trigger a flaw in the parsing of server-key exchange data and execute arbitrary code on the target system.

On Windows XP systems, arbitrary code can be executed.

On Windows 2000 systems, the system will stop accepting SSL/TLS connections.

On Windows 2003 systems, the system will automatically restart.

Windows Vista is not affected.

Microsoft credits Thomas Lim of COSEINC with reporting this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on a connected target system.

A remote user can cause the connected target system to stop processing SSL/TLS connections or reboot.

Solution:   Microsoft has issued the following fixes.

Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=5b8e728c-cb9f-4176-93a0-bf42d6387f93

Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=8615e6f3-415b-4c23-ba52-7eef70a11d77

Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=7e994340-c616-4f66-845b-7eaf095e968a

Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=39e6c6d2-7e6f-4992-a731-36f44fe2d87f

Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=da424772-079c-4351-9759-8886e0f1ba79

Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=028592ff-2b69-472e-b186-bd2cc76bdfa4

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms07-031.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms07-031.mspx (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC