MS Sec Notification mailing list archives

Microsoft Security Bulletin MS03-001: Unchecked Buffer in Locator Service Could Lead to Code Execution (810833)


From: "Microsoft" <0_43313_04BF067D-4CF8-4245-B5C1-58573E5746A8_US () Newsletters Microsoft com>
Date: Wed, 22 Jan 2003 19:24:02 -0800

-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title:      Unchecked Buffer in Locator Service Could Lead to Code
            Execution (810833)
Date:       22 January, 2003
Software:   Microsoft Windows NT 4.0, Windows 2000, and Windows XP
Impact:     Run code of the attacker's choice 
Max Risk:   Critical
Bulletin:   MS03-001

Microsoft encourages customers to review the Security Bulletins at: 
http://www.microsoft.com/technet/security/bulletin/ms03-001.asp
http://www.microsoft.com/security/security_bulletins/ms03-001.asp
- ----------------------------------------------------------------------

Issue:
======
The Microsoft Locator service is a name service that maps logical
names to network-specific names. It ships with Windows NT 4.0,
Windows 2000, and Windows XP. By default, the Locator service is
enabled only on Windows 2000 domain controllers and Windows NT 4.0
domain controllers; it is not enabled on Windows NT 4.0 workstations
or member servers, Windows 2000 workstations or member servers,
or Windows XP. 

A security vulnerability results from an unchecked buffer in the
Locator service. By sending a specially malformed request to the
Locator service, an attacker could cause the Locator service to
fail, or to run code of the attacker's choice on the system. 

Mitigating Factors:
====================
 - The Locator service is not enabled by default on any affected
   versions of Windows with the exception of Windows 2000 domain
   controllers and Windows NT 4.0 domain controllers. 

 - A properly-configured firewall would block the calls to the
   Locator service, which would protect an affected machine from
   an Internet-based attack. 

Risk Rating:
============
 - Windows NT 4.0 (Workstations and Member Servers): Moderate 
 - Windows NT 4.0 (Domain Controllers Only): Critical 
 - Windows NT 4.0, Terminal Server Edition: Moderate 
 - Windows 2000 (Workstations and Member Servers): Moderate 
 - Windows 2000 (Domain Controllers Only): Critical 
 - Windows XP: Moderate 

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletins at
   http://www.microsoft.com/technet/security/bulletin/ms03-001.asp
   http://www.microsoft.com/security/security_bulletins/ms03-001.asp

   for information on obtaining this patch.

Acknowledgment:
===============
 -  David Litchfield of Next Generation Security Software Ltd.
    (http://www.nextgenss.com)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE 
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPi7NZ40ZSRQxA/UrAQEzNggAgAa9wznPiTNtKbrrngSSWIaR/bYQGyzt
OpI7a1qTGOGUvqYObzOkJy9GYzS1fzTN7rgZ6RpKJyqQeaIs+q9ammFCiufma2Jq
0tvenbqxN6h3a2pSDlX8vc8bXb7d4irQoiFn077CrYP3/oGfm+gLGdgGnrLLHQpp
+BfWqvG7IIuk6ZVTkBILlQhsWAA9VrF3rdh1FdEWK+QeK/4hEqxSPIfnuSL9R1ay
f54mhwQ1v0jQfLZq42RHsKGAQdvOwOLcT//5QhwVgSCm9xLjweMCBYyFddua36qR
LNZCDJncgDbs/pqqg5U/Q6moJtJ30RGHS5qyXanr8ZcFHF80YsD2Bw==
=UqEH
-----END PGP SIGNATURE-----


*******************************************************************

You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification 
Service.  For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP key at 
http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at 
http://register.microsoft.com/regsys/pic.asp 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via 
email as described below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at 
http://www.microsoft.com/security.


Current thread: