ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: TSRT-06-02: Microsoft SRV.SYS Mailslot Ring0 Memory Corruption Vulnerability



> -----Original Message-----
> From: Zero Day Initiative [mailto:zdi@xxxxxxxxxxxxxxxx] On 
> Behalf Of Tippingpoint Security Research Team
> Sent: Tuesday, July 11, 2006 11:16 PM
> To: full-disclosure@xxxxxxxxxxxxxxxxx; bugtraq@xxxxxxxxxxxxxxxxx
> Subject: TSRT-06-02: Microsoft SRV.SYS Mailslot Ring0 Memory 
> Corruption Vulnerability
> 
> TSRT-06-02: Microsoft SRV.SYS Mailslot Ring0 Memory Corruption
> Vulnerability
> http://www.tippingpoint.com/security/advisories/TSRT-06-02.html
> July 11, 2006
> 
> -- CVE ID:
> CVE-2006-1314
> 
> -- Affected Vendor:
> Microsoft
> 
> -- Affected Products:
> Windows 2000
> Windows XP SP1
> Windows XP SP2
> Windows 2003
> Windows 2003 SP1
> 
> -- TippingPoint(TM) IPS Customer Protection:
> TippingPoint IPS customers have been protected against this
> vulnerability since July 11, 2006 by Digital Vaccine protection
> filter ID 4266. For further product information on the 
> TippingPoint IPS:
> 
>     http://www.tippingpoint.com
> 
> -- Vulnerability Details:
> This vulnerability allows remote attackers to execute 
> arbitrary code on
> vulnerable installations of the Microsoft Windows operating system.
> Authentication is not required to exploit this vulnerability and code
> execution occurs within the context of the kernel.
> 
> According to the Microsoft Developer Network (MSDN) documentation,
> Mailslot communications are divided into two classes. First-class
> Mailslots are connection oriented and operate over SMB/TCP.
> Second-class Mailslots provide connectionless messaging for broadcast
> messages and operate over SMB/UDP. Second-class Mailslots are limited
> to 424 bytes per message. First-class Mailslots are officially
> unsupported in the Windows 2000, XP and 2003 operating systems.
> 
> The specific flaw exists within the SRV.SYS driver, which is
> responsible for handling all Server Message Block (SMB) 
> traffic. During
> the processing of first-class Mailslot messages, an exploitable memory
> corruption condition is created. As a side effect, attackers are also
> capable of exceeding the second-class Mailslot message size
> limitation.
> 
> It is important to note that this vulnerability affects more than just
> the Windows kernel. Applications built on Mailslot communications that
> rely on the message size restriction of second-class Mailslots are
> likely to be affected by this vulnerability.
> 
> -- Vendor Response:
> Microsoft has issued an update to correct this vulnerability. More
> details can be found at:
> 
> http://www.microsoft.com/technet/security/bulletin/MS06-035.mspx
> 
> -- Disclosure Timeline:
> 2006.03.01 - Vulnerability reported to vendor
> 2006.07.11 - Digital Vaccine released to TippingPoint customers
> 2006.07.11 - Coordinated public release of advisory
> 
> -- Credit:
> This vulnerability was discovered by Pedram Amini, 
> TippingPoint Security
> Research Team in collaboration with HD Moore, Metasploit.
> 




 




Copyright © Lexa Software, 1996-2009.