TITLE:
Microsoft Windows Routing and Remote Access Vulnerabilities

SECUNIA ADVISORY ID:
SA20630

VERIFY ADVISORY:
http://secunia.com/advisories/20630/

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
>From local network

OPERATING SYSTEM:
Microsoft Windows XP Professional
http://secunia.com/product/22/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/

DESCRIPTION:
Two vulnerabilities have been reported in Microsoft Windows, 
which
can be exploited by malicious people or users to compromise a
vulnerable system.

1) A boundary error exists within the Routing and Remote Access
service (RRAS) service when handling certain RPC requests. This 
can
be exploited to cause memory corruption and allows arbitrary 
code
execution.

2) A boundary error exists within the Routing and Remote Access
service (RRAS) service when handling certain RPC requests. This 
can
be exploited to cause corruption of the RASMAN registry and 
allows
arbitrary code execution.

Successful exploitation on Windows XP SP2 and Windows Server 
2003
requires valid logon credentials. On Windows 2000 SP4 and 
Windows XP
SP1, the vulnerabilities can be exploited by anonymous users.

SOLUTION:
Apply patches.

Microsoft Windows 2000 SP4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=c1af96b2-2807-444b-82df-b6b61ec63715

Microsoft Windows XP SP1 or SP2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=74838e2b-bd5f-4584-81f1-3250e6b69728

Microsoft Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=09d1a284-6a16-44a5-a95e-8eb566401ce9

Microsoft Windows Server 2003 (with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=b4264cb9-8979-40e8-b903-bc8deda00fec

Microsoft Windows Server 2003 (Itanium) (with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=890535c9-98cf-49a9-ae50-178e3c5fac6b

Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=bf9cef95-89fd-4ec3-be0a-93902f2bb768

ORIGINAL ADVISORY:
MS06-025 (KB911280):
http://www.microsoft.com/technet/security/Bulletin/MS06-025.mspx
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to