Buffer Overrun in Microsoft Windows Server Message Block

Reported July 9, 2003, by Microsoft.




  • Microsoft Windows NT 4.0 Server

  • Microsoft Windows NT 4.0 Terminal Server Edition

  • Microsoft Windows 2000

  • Microsoft Windows XP




A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systems that can result in the execution of arbitrary code on the vulnerable computer. This vulnerability stems from a flaw in the way the server validates the parameters of a Server Message Block (SMB) packet. By sending a specially crafted SMB packet request, a potential attacker could cause a buffer overrun to occur, leading to data corruption, system failure, or execute arbitrary code on the vulnerable system.





Microsoft has released Security Bulletin MS03-024, "Buffer Overrun in Windows Could Lead to Data Corruption (817606)" to address this vulnerability and recommends that affected users immediately apply the patch mentioned in the bulletin.



Discovered by Jeremy Allison and Andrew Tridgell.

TAGS: Security
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.