[This is a MS win2k vulnerability but I am posting it here in hope that
sysadmins who administer win2k PCs may be forewarned]

Microsoft Windows PostThreadMessage() Arbitrary Process Killing
Vulnerability
--------------------------------------
A vulnerability has been discovered in the Microsoft Windows operating
system. The flaw lies in the way that processes handle messages sent
from another process via the PostThreadMessage() API call. Reports
indicate that, if a running process has a message queue and is sent one
of 3 different messages, the process may terminate. This termination
will occur despite any security level differences between processes, as
well as any safe guards to prevent this behaviour, such as requiring a
password before the process is killed. 

This issue likely occurs due to a design error, specifically failing to
ensure that process verifies the origin of messages recieved via the
PostThreadMessage() API call.

Exploit
-------
An exploit has been developed by Brett Moore and can be found below.
http://www.securityfocus.com/data/vulnerabilities/
exploits/AppShutdown.c

-- 
   / \__
  (    @\___    Raj Shekhar      
  /         O   My home : http://geocities.com/lunatech3007/
 /   (_____/    My blog : http://lunatech.journalspace.com/
/_____/   U      



_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to