Thread-topic: [SA22896] Microsoft Agent URL Parsing Memory Corruption Vulnerability
> ----------------------------------------------------------------------
>
> TITLE:
> Microsoft Agent URL Parsing Memory Corruption Vulnerability
>
> SECUNIA ADVISORY ID:
> SA22896
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Microsoft Windows 2000 Advanced Server
>
> Microsoft Windows 2000 Datacenter Server
>
> Microsoft Windows 2000 Professional
>
> Microsoft Windows 2000 Server
>
> Microsoft Windows Server 2003 Datacenter Edition
>
> Microsoft Windows Server 2003 Enterprise Edition
>
> Microsoft Windows Server 2003 Standard Edition
>
> Microsoft Windows Server 2003 Web Edition
>
> Microsoft Windows XP Home Edition
>
> Microsoft Windows XP Professional
>
>
> DESCRIPTION:
> Secunia Research has discovered a vulnerability in Microsoft Windows,
> which can be exploited by malicious people to compromise a user's
> system.
>
> The vulnerability is caused due to an error in Microsoft Agent
> (agentsvr.exe) when processing specially crafted URLs passed as
> arguments to certain methods.
>
> Successful exploitation allows execution of arbitrary code when a
> user e.g. visits a malicious website with Internet Explorer.
>
> SOLUTION:
> Apply patches.
>
> Windows 2000 (requires SP4):
>
> 70b-64e2-47ec-be90-622b407c7751
>
> Windows XP (requires SP2):
>
> eda-6e8c-40d6-a3c0-d61362411acc
>
> Windows XP Professional x64 Edition (optionally with SP2):
>
> 036-898f-41af-a3de-4a899a15d25d
>
> Windows Server 2003 (optionally with SP1/SP2):
>
> 0d2-d754-44cd-8318-9ce94b8d01b4
>
> Windows Server 2003 x64 Edition (requires SP1/SP2):
>
> b54-b6ff-46ed-b2bc-3b00b0984e1e
>
> Windows Server 2003 for Itanium-based systems (optionally with
> SP1/SP2):
>
> 0ca-e976-460f-8e50-c19d1b02b42f
>
> PROVIDED AND/OR DISCOVERED BY:
> JJ Reyes and Carsten Eiram, Secunia Research.
>
> ORIGINAL ADVISORY:
> MS07-020 (KB932168):
>
>
> Secunia Research:
>
>