Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
BID:12969
Info
Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
| Bugtraq ID: | 12969 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Unknown |
| Local: | Yes |
| Published: | Apr 01 2005 12:00AM |
| Updated: | Apr 01 2005 12:00AM |
| Credit: | Discovery is credited to PivX Labs. |
| Vulnerable: |
Microsoft Windows XP Tablet PC Edition SP2 Microsoft Windows XP Tablet PC Edition SP1 Microsoft Windows XP Tablet PC Edition Microsoft Windows XP Professional SP2 Microsoft Windows XP Professional SP1 Microsoft Windows XP Professional Microsoft Windows XP Media Center Edition SP2 Microsoft Windows XP Media Center Edition SP1 Microsoft Windows XP Media Center Edition Microsoft Windows XP Home SP2 Microsoft Windows XP Home SP1 Microsoft Windows XP Home Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Enterprise Edition Itanium 0 Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Datacenter Edition Itanium 0 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Workstation 4.0 Microsoft Windows NT Terminal Server 4.0 SP6a Microsoft Windows NT Terminal Server 4.0 SP6 Microsoft Windows NT Terminal Server 4.0 SP5 Microsoft Windows NT Terminal Server 4.0 SP4 Microsoft Windows NT Terminal Server 4.0 SP3 Microsoft Windows NT Terminal Server 4.0 SP2 Microsoft Windows NT Terminal Server 4.0 SP1 Microsoft Windows NT Terminal Server 4.0 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Server 4.0 Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Enterprise Server 4.0 SP6 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows ME Microsoft Windows 98SE Microsoft Windows 98 Microsoft Windows 95 SR2 Microsoft Windows 95 Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 2000 Professional SP4 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Datacenter Server SP4 Microsoft Windows 2000 Datacenter Server SP3 Microsoft Windows 2000 Datacenter Server SP2 Microsoft Windows 2000 Datacenter Server SP1 Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Advanced Server SP4 Microsoft Windows 2000 Advanced Server SP3 Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server |
| Not Vulnerable: | |
Discussion
Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
Microsoft Windows is reported prone to an unspecified buffer overflow vulnerability when handling a malformed UNC path.
It is reported that this issue can be triggered by supplying a malformed UNC path through the command line. Further details were not disclosed, however, it is conjectured that a local attacker supplies excessive data as a UNC path to trigger the overflow condition leading to memory corruption. It is currently not known if this will allow a local attacker to gain elevated privileges.
Although unconfirmed, this issue may also pose a remote risk if an attacker is able to supply a vulnerable user with a malformed UNC path and entice them to open it or through an application that processes UNC paths.
This issue has reportedly been addressed with the release of Windows Server 2003 SP1. Operating system releases prior to Server 2003 are also reportedly affected.
Due to a lack of details, further information is not available at the moment. This BID will be updated when more details are released.
Microsoft Windows is reported prone to an unspecified buffer overflow vulnerability when handling a malformed UNC path.
It is reported that this issue can be triggered by supplying a malformed UNC path through the command line. Further details were not disclosed, however, it is conjectured that a local attacker supplies excessive data as a UNC path to trigger the overflow condition leading to memory corruption. It is currently not known if this will allow a local attacker to gain elevated privileges.
Although unconfirmed, this issue may also pose a remote risk if an attacker is able to supply a vulnerable user with a malformed UNC path and entice them to open it or through an application that processes UNC paths.
This issue has reportedly been addressed with the release of Windows Server 2003 SP1. Operating system releases prior to Server 2003 are also reportedly affected.
Due to a lack of details, further information is not available at the moment. This BID will be updated when more details are released.
Exploit / POC
Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
Solution:
It is reported that the vendor has addressed this issue with the release of Windows Server 2003 SP1. This information is not confirmed at the moment. Users are advised to contact the vendor for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
It is reported that the vendor has addressed this issue with the release of Windows Server 2003 SP1. This information is not confirmed at the moment. Users are advised to contact the vendor for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
References
Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability
References:
References:
- Windows Server 2003 Service Pack 1 (Microsoft)