Looks like a firewall prevents this vulnerability as well. 
(Always look under "Vulnerability Details " at the provided 
link "ORIGINAL ADVISORY").
-Clint

==============================
TITLE:
Microsoft Windows Telephony Service Vulnerability

SECUNIA ADVISORY ID:
SA16354

VERIFY ADVISORY:
http://secunia.com/advisories/16354/

CRITICAL:
Moderately critical

IMPACT:
Privilege escalation, System access

WHERE:
>From local network

OPERATING SYSTEM:
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 98
http://secunia.com/product/12/
Microsoft Windows 98 Second Edition
http://secunia.com/product/13/
Microsoft Windows Millenium
http://secunia.com/product/14/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows XP Professional
http://secunia.com/product/22/

DESCRIPTION:
A vulnerability has been reported in Microsoft Windows, which 
can be
exploited by malicious, local users to gain escalated 
privileges or
by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an unspecified error in the 
TAPI
(Telephony Application Programming Interface) service when 
validating
permissions and the length of certain messages before copying 
the data
to an allocated buffer.

Successful exploitation allows malicious, local users to gain
escalated privileges. On certain configurations of Windows 2000
Server and Windows Server 2003 with the Telephony service 
enabled
(disabled by default), it is also possible to exploit the
vulnerability without a local account. However, only 
authenticated
users can access the service on Windows Server 2003 and hence 
exploit
the vulnerability.

SOLUTION:
Apply patches.

Microsoft Windows 2000 (requires SP4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=C7417EA1-7AFC-4A55-95DC-E814975B8AE6

Microsoft Windows XP (requires SP1 or SP2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=B049004B-AF28-41D7-8AE6-7A3DB15211F1

Microsoft Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=705545D0-B53B-4E17-8B62-A4C652697C61

Microsoft Windows Server 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0097FE14-1D6B-4423-A437-DEA1ED665A07

Microsoft Windows Server 2003 (for Itanium-based systems):
http://www.microsoft.com/downloads/details.aspx?FamilyId=BC16BEAE-0BAD-490C-A80F-4BF81C360CA0

Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0CEF9CC2-A7BD-42E0-81B1-EDC303DA8A40

Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft 
Windows
ME:
The vendor will not be releasing patches, as the vulnerability 
isn't
considered critical on these versions.


ORIGINAL ADVISORY:
MS05-40 (KB893756):
http://www.microsoft.com/technet/security/Bulletin/MS05-040.mspx
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to