Unchecked Buffer in Windows Redirector Could Allow Privilege Elevation WinXP: Feb 6

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

eddie5659

Thread Starter
Moderator
Malware Specialist
Joined
Mar 19, 2001
Messages
37,277
Hiya

The Windows Redirector is used by a Windows client to access files,
whether local or remote, regardless of the underlying network
protocols in use. For example, the "Add a Network Place" Wizard or
the NET USE command can be used to map a network share as a local
drive, and the Windows Redirector will handle the routing of
information to and from the network share.

A security vulnerability exists in the implementation of the
Windows Redirector on Windows XP because an unchecked buffer is
used to receive parameter information. By providing malformed data
to the Windows Redirector, an attacker could cause the system to
fail, or if the data was crafted in a particular way, could run
code of the attacker's choice.


Maximum Severity Rating: Important

Affected Software:

Microsoft Windows XP

Download locations for this patch

Windows XP:


32-bit Edition

64-bit Edition

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-005.asp

Regards

eddie
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top