Buffer Overrun in Windows Could Lead to Data Corruption

Status
Not open for further replies.

TS | Thomas

Posts: 1,318   +2
Affected Software:
Microsoft Windows NT Server 4.0
Microsoft Windows NT Server 4.0, Terminal Server Edition
Microsoft Windows 2000
Windows XP Professional

A flaw exists in the way that the server validates the parameters of an SMB packet. When a client system sends an SMB packet to the server system, it includes specific parameters that provide the server with a set of “instructions.” In this case, the server is not properly validating the buffer length established by the packet. If the client specifies a buffer length that is less than what is needed, it can cause the buffer to be overrun.

By sending a specially crafted SMB packet request, an attacker could cause a buffer overrun to occur. If exploited, this could lead to data corruption, system failure, or—in the worst case—it could allow an attacker to run the code of their choice. An attacker would need a valid user account & would need to be authenticated by the server to exploit this flaw.

Patch availability
Download locations for this patch.
 
The patch executable will not install if Win2K SP4 is installed. The error message says that certain files in the executable are older than SP4, and SP3 or earlier is required for the patch to install.
 
Just checked into that on the proper knowledge base article for this patch. Yep, Windows 2000 SP4 supersedes this patch alright.
 
Status
Not open for further replies.
Back