TITLE:
Microsoft Windows MSDTC and COM+ Vulnerabilities

SECUNIA ADVISORY ID:
SA17161

VERIFY ADVISORY:
http://secunia.com/advisories/17161/

CRITICAL:
Moderately critical

IMPACT:
Privilege escalation, DoS, System access

WHERE:
>From local network

OPERATING SYSTEM:
Microsoft Windows XP Professional
http://secunia.com/product/22/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/

DESCRIPTION:
Some vulnerabilities have been reported in Microsoft Windows, which
can be exploited by malicious, local users to gain escalated
privileges, or by malicious people to cause a DoS (Denial of
Service), or compromise a vulnerable system.

1) An unchecked buffer in the MSDTC (Microsoft Distributed
Transaction Coordinator) can be exploited to execute arbitrary code
or to gain escalated privileges.

The vulnerability has been reported in the following versions:
* Windows 2000
* Windows XP Service Pack 1
* Windows Server 2003

2) An error in COM+ can be exploited to execute arbitrary code on a
vulnerable system via a specially crafted network message, or to gain
escalated privileges by running a specially crafted application.

The vulnerability has been reported in the following versions:
* Windows 2000 (remote code execution)
* Windows XP Service Pack 1 (remote code execution)
* Windows XP Service Pack 2 (local privilege escalation)
* Windows Server 2003 (local privilege escalation)
* Windows Server 2003 Service Pack 1 (local privilege escalation)

3) An error in the MSDTC when validating TIP (Transaction Internet
Protocol) requests can be exploited to cause the service to stop
responding via a specially crafted network message. The malicious TIP
message can be transferred through the affected system to another,
which causes the MSDTC on both systems to stop responding.

Successful exploitation requires that the TIP protocol is enabled for
MSDTC.

SOLUTION:
Apply patches.

Microsoft Windows 2000 (requires SP 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4E5B96D8-BA74-4008-80D9-922364ABC6AC

Microsoft Windows XP (requires SP 1 or SP 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=20F79CE7-D4DB-42D7-8E57-58656A3FB2F7

Microsoft Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=A6EC1352-042E-4FFB-B379-0E1C06AB9DBE

Microsoft Windows Server 2003 (with or without SP 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=CA202CCC-792E-4462-9A2F-A20D1F8607F7

Microsoft Windows Server 2003 (Itanium) (with or without SP 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=554A86A5-0B03-4CA9-A32D-642E40570424

Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1FF26142-6E1E-4E17-9DCD-994B339A69CF

ORIGINAL ADVISORY:
MS05-051 (KB902400):
http://www.microsoft.com/technet/security/Bulletin/MS05-051.mspx
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to