Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
BID:12484
Info
Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 12484 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2005-0045 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 08 2005 12:00AM |
| Updated: | May 25 2006 08:23PM |
| Credit: | Discovery of this vulnerability is credited to eEYE Security. This issue was also independently discovered by Dave Aitel and Sinan Eren of Immunity Sec. |
| Vulnerable: |
Nortel Networks Symposium Express Call Center (SECC) Nortel Networks Symposium Call Center Server (SCCS) Nortel Networks Optivity Network Management System Nortel Networks Mobile Voice Client 2050 Nortel Networks IP softphone 2050 Microsoft Windows XP Tablet PC Edition SP2 Microsoft Windows XP Tablet PC Edition SP1 Microsoft Windows XP Tablet PC Edition Microsoft Windows XP Professional SP2 Microsoft Windows XP Professional SP1 Microsoft Windows XP Professional Microsoft Windows XP Media Center Edition SP2 Microsoft Windows XP Media Center Edition SP1 Microsoft Windows XP Media Center Edition Microsoft Windows XP Home SP2 Microsoft Windows XP Home SP1 Microsoft Windows XP Home Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Enterprise Edition Itanium 0 Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Datacenter Edition Itanium 0 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Terminal Server 4.0 SP6a Microsoft Windows NT Terminal Server 4.0 SP6 Microsoft Windows NT Terminal Server 4.0 SP5 Microsoft Windows NT Terminal Server 4.0 SP4 Microsoft Windows NT Terminal Server 4.0 SP3 Microsoft Windows NT Terminal Server 4.0 SP2 Microsoft Windows NT Terminal Server 4.0 SP1 Microsoft Windows NT Terminal Server 4.0 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Server 4.0 Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Enterprise Server 4.0 SP6 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 2000 Professional SP4 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Advanced Server SP4 Microsoft Windows 2000 Advanced Server SP3 Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server |
| Not Vulnerable: | |
Discussion
Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
Microsoft Windows Server Message Block handler is reported prone to a remote buffer-overflow vulnerability.
Note that since SMB drivers execute in the kernel memory space, a successful attack can grant a remote attacker unauthorized access with ring-0 privileges.
Microsoft has noted that other protocols, such as IPX/SPX, could also be vulnerable to this issue.
**Update: Microsoft Windows NT 4.0 has also been reported vulnerable to this issue.
Microsoft Windows Server Message Block handler is reported prone to a remote buffer-overflow vulnerability.
Note that since SMB drivers execute in the kernel memory space, a successful attack can grant a remote attacker unauthorized access with ring-0 privileges.
Microsoft has noted that other protocols, such as IPX/SPX, could also be vulnerable to this issue.
**Update: Microsoft Windows NT 4.0 has also been reported vulnerable to this issue.
Exploit / POC
Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
An exploit is reportedly available to members of the Immunity Partners program.
The following exploit has been provided by [email protected]:
An exploit is reportedly available to members of the Immunity Partners program.
The following exploit has been provided by [email protected]:
Solution / Fix
Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
Solution:
Microsoft has released an advisory (MS05-011) and updates to address this issue.
Microsoft Windows NT 4.0 has also been found vulnerable to this issue. This platform is no longer publicly supported by Microsoft. A patch is available for customers who have an active end-of-life support agreement including extended Windows NT 4.0 support. Customers are advised to contact Microsoft about obtaining and applying this patch.
For more information on the end-of-life support agreement, see the following location:
http://www.microsoft.com/presspass/features/2004/dec04/12-03NTSupport.asp
Nortel Networks has released security advisory 2005005515 acknowledging this issue. Please the referenced advisory for further information.
Microsoft Windows XP Media Center Edition SP2
Microsoft Windows XP Tablet PC Edition SP1
Microsoft Windows XP Tablet PC Edition SP2
Microsoft Windows XP Media Center Edition SP1
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows XP Home SP2
Microsoft Windows Server 2003 Web Edition
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows XP Home SP1
Microsoft Windows 2000 Server SP3
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP Professional SP2
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Professional SP4
Microsoft Windows XP Professional SP1
Solution:
Microsoft has released an advisory (MS05-011) and updates to address this issue.
Microsoft Windows NT 4.0 has also been found vulnerable to this issue. This platform is no longer publicly supported by Microsoft. A patch is available for customers who have an active end-of-life support agreement including extended Windows NT 4.0 support. Customers are advised to contact Microsoft about obtaining and applying this patch.
For more information on the end-of-life support agreement, see the following location:
http://www.microsoft.com/presspass/features/2004/dec04/12-03NTSupport.asp
Nortel Networks has released security advisory 2005005515 acknowledging this issue. Please the referenced advisory for further information.
Microsoft Windows XP Media Center Edition SP2
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows XP Tablet PC Edition SP1
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows XP Tablet PC Edition SP2
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows XP Media Center Edition SP1
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
-
Microsoft Security Update for Windows Server 2003 64-bit Edition and Windows XP 64-bit Edition, Version 2003 (
http://www.microsoft.com/downloads/details.aspx?familyid=8DA45DD0-882E -417C-A7F2-4AABAD675129&displaylang=en
Microsoft Windows Server 2003 Standard Edition
-
Microsoft Security Update for Windows Server 2003 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=1B703115-54C0 -445C-B5CE-E9A53C45B36A&displaylang=en
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
-
Microsoft Security Update for Windows Server 2003 64-bit Edition and Windows XP 64-bit Edition, Version 2003 (
http://www.microsoft.com/downloads/details.aspx?familyid=8DA45DD0-882E -417C-A7F2-4AABAD675129&displaylang=en
Microsoft Windows XP 64-bit Edition SP1
-
Microsoft Security Update for Windows XP 64-bit Edition (KB885250)
Microsoft reports that this fix may be applied to Windows XP 64-bit Edition. No specific service packs were mentioned in the supported operating system text but Windows XP 64-bit Edition Service Pack 1 was mentioned as the affected software.
http://www.microsoft.com/downloads/details.aspx?familyid=E5043926-0B79 -489B-8EA1-85512828C6F4&displaylang=en
Microsoft Windows Server 2003 Datacenter Edition
-
Microsoft Security Update for Windows Server 2003 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=1B703115-54C0 -445C-B5CE-E9A53C45B36A&displaylang=en
Microsoft Windows 2000 Advanced Server SP4
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows 2000 Professional SP3
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows Server 2003 Enterprise Edition
-
Microsoft Security Update for Windows Server 2003 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=1B703115-54C0 -445C-B5CE-E9A53C45B36A&displaylang=en
Microsoft Windows XP Home SP2
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows Server 2003 Web Edition
-
Microsoft Security Update for Windows Server 2003 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=1B703115-54C0 -445C-B5CE-E9A53C45B36A&displaylang=en
Microsoft Windows 2000 Advanced Server SP3
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows XP Home SP1
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows 2000 Server SP3
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows XP 64-bit Edition Version 2003
-
Microsoft Security Update for Windows Server 2003 64-bit Edition and Windows XP 64-bit Edition, Version 2003 (
http://www.microsoft.com/downloads/details.aspx?familyid=8DA45DD0-882E -417C-A7F2-4AABAD675129&displaylang=en
Microsoft Windows XP 64-bit Edition
-
Microsoft Security Update for Windows XP 64-bit Edition (KB885250)
Microsoft reports that this fix may be applied to Windows XP 64-bit Edition. No specific service packs were mentioned in the supported operating system text but Windows XP 64-bit Edition Service Pack 1 was mentioned as the affected software.
http://www.microsoft.com/downloads/details.aspx?familyid=E5043926-0B79 -489B-8EA1-85512828C6F4&displaylang=en
Microsoft Windows XP Professional SP2
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
Microsoft Windows 2000 Server SP4
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows 2000 Professional SP4
-
Microsoft Security Update for Windows 2000 (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=656BDDA5-672B -4A6B-B192-24A2171C7355&displaylang=en
Microsoft Windows XP Professional SP1
-
Microsoft Security Update for Windows XP (KB885250)
http://www.microsoft.com/downloads/details.aspx?familyid=6DF9B2D9-B86E -4924-B677-978EC6B81B54&displaylang=en
References
Microsoft Windows Server Message Block Handlers Remote Buffer Overflow Vulnerability
References:
References:
- [Dailydave] ID, Apples (Dave Aitel
) - GREENAPPLE: SMB remote vulnerabilities in Windows (Immunity, Inc.)
- Microsoft Security Bulletin MS05-011 (Microsoft)
- Security Advisory Bulletins (Nortel Networks)
- EEYE: Windows SMB Client Transaction Response Handling Vulnerability ("Marc Maiffret"
) - Update: MS05-011 EEYE: Windows SMB Client Transaction Response Handling Vulnerab ("Marc Maiffret"
) - Windows SMB Client Transaction Response Handling PoC ([email protected])