Ravens PHP Scripts

Microsoft Windows SNMP Service Buffer Overflow Vulnerability
Date: Wednesday, December 13, 2006 @ 00:40:58 UTC
Topic: Security


SECUNIA ADVISORY ID: SA23307

VERIFY ADVISORY: http://secunia.com/advisories/23307/

CRITICAL: Moderately critical

IMPACT: System access

OPERATING SYSTEM:
Microsoft Windows Server 2003 Enterprise Edition - http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition - http://secunia.com/product/1175/
Microsoft Windows XP Professional - http://secunia.com/product/22/
Microsoft Windows XP Home Edition - http://secunia.com/product/16/
Microsoft Windows 2000 Server - http://secunia.com/product/20/
Microsoft Windows 2000 Professional - http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server - http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server - http://secunia.com/product/21/
Microsoft Windows Server 2003 Standard Edition - http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition - http://secunia.com/product/1176/

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.


The vulnerability is caused due to a boundary error in the SNMP service and can be exploited to cause a buffer overflow via a specially crafted message. Successful exploitation allows execution of arbitrary code.

SOLUTION: Apply patches.

Windows 2000 SP4: http://www.microsoft.com/downloads/details.aspx?FamilyId=ef2dbcb6-cc8e-4299-a1e6-e6db202b41d5
Windows XP SP2: http://www.microsoft.com/downloads/details.aspx?FamilyId=2b57e00f-0f47-4567-b40f-f630ba5a29cb
Windows XP Professional x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=65ab5876-7c9a-4add-8b6d-0fd7d617397a
Windows Server 2003 (optionally with SP1): http://www.microsoft.com/downloads/details.aspx?FamilyId=7856ee11-4f3a-4138-
bfce-1b97fb25be69
Windows Server 2003 for Itanium-based systems (optionally with SP1): http://www.microsoft.com/downloads/details.aspx?FamilyId=c1b01b91-c565-4d1f-90ec-f57a70fa012e
Microsoft Windows Server 2003 x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=5b61249a-dba7-4fd5-85f3-b918044bbc92

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
* Kostya Kortchinsky, Immunity.
* Clement Seguy, European Aeronautic Defence and Space Company.

ORIGINAL ADVISORY: MS06-074 (KB926247): http://www.microsoft.com/technet/security/Bulletin/MS06-074.mspx






This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2555