Buffer Overrun in Microsoft Windows Server Message Block
A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systems that can result in the execution of arbitrary code on the vulnerable computer.
July 9, 2003
Reported July 9, 2003, by Microsoft.
VERSIONS AFFECTED
Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
DESCRIPTION
A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systemsthat can result in the execution of arbitrary code on the vulnerable computer. This vulnerability stems from a flaw in the way the server validates the parameters of a Server Message Block (SMB) packet. By sending a specially crafted SMB packet request, a potential attacker could cause a buffer overrun to occur, leading to data corruption, system failure, or execute arbitrary code on the vulnerable system.
VENDOR RESPONSE
Microsoft has released Security BulletinMS03-024, "Buffer Overrun in Windows Could Lead to Data Corruption (817606)" to address this vulnerability and recommends that affected users immediately apply the patch mentioned in the bulletin.
CREDIT
Discovered by Jeremy Allison and Andrew Tridgell.
Read more about:
MicrosoftAbout the Author
You May Also Like