Buffer Overrun in Microsoft Windows Server Message Block

A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systems that can result in the execution of arbitrary code on the vulnerable computer.

Ken Pfeil

July 9, 2003

2 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported July 9, 2003, by Microsoft.

 

VERSIONS AFFECTED

 

  • Microsoft Windows NT 4.0 Server

  • Microsoft Windows NT 4.0 Terminal Server Edition

  • Microsoft Windows 2000

  • Microsoft Windows XP

 

DESCRIPTION

 

A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systemsthat can result in the execution of arbitrary code on the vulnerable computer. This vulnerability stems from a flaw in the way the server validates the parameters of a Server Message Block (SMB) packet. By sending a specially crafted SMB packet request, a potential attacker could cause a buffer overrun to occur, leading to data corruption, system failure, or execute arbitrary code on the vulnerable system.

 

 

VENDOR RESPONSE

 

Microsoft has released Security BulletinMS03-024, "Buffer Overrun in Windows Could Lead to Data Corruption (817606)" to address this vulnerability and recommends that affected users immediately apply the patch mentioned in the bulletin.

 

CREDIT

Discovered by Jeremy Allison and Andrew Tridgell.

Read more about:

Microsoft
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like