Reported July 9, 2003, by
Microsoft.
VERSIONS
AFFECTED
Microsoft Windows NT 4.0
Server
Microsoft Windows NT 4.0
Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
DESCRIPTION
A new vulnerability exists
in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systems
that
can result in the
execution of arbitrary code on the vulnerable computer. This vulnerability stems
from a flaw in the way the server validates the parameters of a Server Message
Block (SMB) packet. By sending a specially crafted SMB packet request, a
potential attacker could cause a buffer overrun to occur, leading to data
corruption, system failure, or execute arbitrary code on the vulnerable system.
VENDOR
RESPONSE
Microsoft has released Security Bulletin
MS03-024, "Buffer
Overrun in Windows Could Lead to Data Corruption (817606)"
to address this vulnerability and recommends that affected users immediately
apply the patch mentioned in the bulletin.
CREDIT
Discovered by Jeremy
Allison and Andrew Tridgell.
Buffer Overrun in Microsoft Windows Server Message Block
0 comments
Hide comments