Lucene search

K
certCERTVU:827267
HistoryOct 23, 2008 - 12:00 a.m.

Microsoft Server service RPC stack buffer overflow vulnerability

2008-10-2300:00:00
www.kb.cert.org
92

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Overview

A stack buffer overflow vulnerability in the Microsoft Windows Server service may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges.

Description

MS08-067 includes the following information about the Microsoft Server service:

_The Server service provides RPC support, file print support and named pipe sharing over the network. The Server service allows the sharing of your local resources (such as disks and printers) so that other users on the network can access them. It also allows named pipe communication between applications running on other computers and your computer, which is used for RPC. _
The Microsoft Server service contains a stack buffer overflow vulnerability in the handling of Remote Procedure Call (RPC) messages.

Exploit code for this vulnerability is publicly available, and the vulnerability is being currently exploited in the wild.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges on a vulnerable system.
Certain versions of malicious code called Conficker or Downadup attempt to exploit this vulnerability.


Solution

Apply the updates referenced in Microsoft Security Bulletin MS08-067.


Block or Restrict Access

Block access to SMB services (139/tcp, 445/tcp) from untrusted networks such as the Internet. This and additional workarounds are provide in Microsoft Security Bulletin MS08-067.


Vendor Information

827267

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: November 05, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Please see Microsoft Security Bulletin MS08-067.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to Microsoft for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2008-4250
Severity Metric: 88.20 Date Public:

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%