Microsoft Windows Network Connection Manager (NCM) handler routine may execute code with LocalSystem privileges

2002-08-16T00:00:00
ID VU:721611
Type cert
Reporter CERT
Modified 2002-08-22T18:56:00

Description

Overview

A locally exploitable vulnerability exists in the Microsoft Windows 2000 Network Connection Manager (NCM). Exploitation of this vulnerability may permit a local user to gain full privileges on the system.

Description

Microsoft Windows 2000 Network Connection Manager (NCM) provides routines to control all network connections managed by the system, such as dial-up and local area network connections. A vulnerability exists in the privileges applied to the NCM configuration that runs a handler when a network connection has been established. This handler routine should run in the security context of the user. However, an unprivileged local user can configure what handler routine is used by the NCM when a new network connection is established and cause the handler routine to run in the security context of the "LocalSystem." The NCM would then execute the attacker's code with full system privileges when the attacker establishes a connection.


Impact

A local user may be able to execute arbitrary code with full system privileges.


Solution

Apply the patch provided in Microsoft's Security Bulletin (MS02-042). Note that according to the Microsoft Bulletin, only Windows XP, Windows 2000, and Windows NT 4.0 were tested to assess whether they are affected by these vulnerabilities. Previous versions may or may not be affected by these vulnerabilities.


Vendor Information

721611

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: August 16, 2002

Status

Affected

Vendor Statement

See Microsoft's Security Bulletin (MS02-042).

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

<http://www.microsoft.com/technet/security/bulletin/ms02-042.asp>

Acknowledgements

This vulnerability was announced in a Microsoft Security Bulletin.

This document was written by Jason A Rafail and is based on information from Microsoft Security Bulletin (MS02-042).

Other Information

CVE IDs: | CVE-2002-0720
---|---
Severity Metric: | 11.25
Date Public: | 2002-08-14
Date First Published: | 2002-08-16
Date Last Updated: | 2002-08-22 18:56 UTC
Document Revision: | 12