SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Server Message Block Vendors:   Microsoft
Windows Server Message Block Buffer Underflow Lets Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1021049
SecurityTracker URL:  http://securitytracker.com/id/1021049
CVE Reference:   CVE-2008-4038   (Links to External Site)
Date:  Oct 14 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP3, Vista SP1, 2008; and prior service packs
Description:   A vulnerability was reported in Windows Server Message Block. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send specially crafted SMB filename data to the target system that is sharing files or folders to trigger a buffer underflow and execute arbitrary code on the target system.

Joshua Morin of Codenomicon reported this vulnerability.

Impact:   A remote authenticated user can execute arbitrary code on the target system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?familyid=9ED29C3A-0682-4586-BBC2-A73DEAA18E4C

Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=2F7E5981-6EEF-4F08-86C0-C6A7607EA5D0

Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=2F7E5981-6EEF-4F08-86C0-C6A7607EA5D0

Windows XP Professional x64 Edition:

http://www.microsoft.com/downloads/details.aspx?familyid=4E1675EB-6B06-48E9-9765-23A2C7737BDC

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=4E1675EB-6B06-48E9-9765-23A2C7737BDC

Windows Server 2003 Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=DBBEBB3F-F1C7-402C-BD16-6F88DA0D042C

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=DBBEBB3F-F1C7-402C-BD16-6F88DA0D042C

Windows Server 2003 x64 Edition:

http://www.microsoft.com/downloads/details.aspx?familyid=989AC6F1-515C-467D-A200-2AABE66D9319

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=989AC6F1-515C-467D-A200-2AABE66D9319

Windows Server 2003 with SP1 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=91589CFB-15BA-4DD2-9E3B-107899FBCBA6

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=91589CFB-15BA-4DD2-9E3B-107899FBCBA6

Windows Vista and Windows Vista Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=72DD6015-25D1-45F4-A769-88AC43074B44

Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=F793AF16-5464-4DB1-A42B-1C5F17C538ED

Windows Server 2008 for 32-bit Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=CF6744E6-B54C-40F6-A78D-7BA9453133C0

Windows Server 2008 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=223236E8-7B19-4B47-8A90-BFC35EB9318A

Windows Server 2008 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=077B697C-04A0-45BD-B08C-331D5C30CB47

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms08-063.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms08-063.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC