TITLE: Microsoft Windows Plug-and-Play Service Arbitrary Code Execution SECUNIA ADVISORY ID: SA17166
VERIFY ADVISORY: http://secunia.com/advisories/17166/ CRITICAL: Moderately critical IMPACT: Privilege escalation, System access WHERE: >From local network OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges, or by malicious users to compromise a vulnerable system. The vulnerability is caused due to error in the Plug-and-Play service and can be exploited to execute arbitrary code. On Windows 2000 and Windows XP Service Pack 1, the vulnerability can be exploited by an authenticated user via a specially crafted network message sent to a vulnerable system. On Windows XP Service Pack 2, the vulnerability can only be exploited for local privilege escalation. SOLUTION: Apply patches. Microsoft Windows 2000 (requires SP 4): http://www.microsoft.com/downloads/details.aspx?FamilyId=FFDB8AB7-F979-41B4-9625-EA51CD503258 Microsoft Windows XP (requires SP 1 or SP 2): http://www.microsoft.com/downloads/details.aspx?FamilyId=1559E44A-DDEE-4C86-BF02-A6C3B9BEEE0C ORIGINAL ADVISORY: MS05-047 (KB905749): http://www.microsoft.com/technet/security/Bulletin/MS05-047.mspx ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
