Microsoft Services for Unix 3.0 Interix SDK contains a remotely exploitable buffer overflow.
Quoting from Microsoft's Services for Unix 3.0 homepage, "Windows Services for UNIX version 3.0 provides a full range of cross-platform services for integrating Windows into existing UNIX-based environments." Interix SDK, "...provides compilers, tools, libraries & debuggers for migrating applications on UNIX to run in a Windows environment." You might wonder how Windows Services for UNIX and Interix SDK are related. Microsoft states, "The Interix technology provides a UNIX environment that runs on top the Windows kernel, enabling UNIX applications and scripts to run natively on the Windows platform alongside Windows applications. With this capability, an installation can continue to get value out of its UNIX scripts and applications.simply reuse them on Windows."
A buffer overflow vulnerability in the RPC library can allow an attacker to mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.
An unauthenticated remote attacker can mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.
Apply a patch.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Updated: October 03, 2002
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This document was written by Ian A Finlay. It is based on information provided by Microsoft.
CVE IDs: | CVE-2002-1140
Severity Metric: | 2.81
Date Public: | 2002-10-02
Date First Published: | 2002-10-04
Date Last Updated: | 2002-10-04 18:25 UTC
Document Revision: | 7