Lucene search

K
certCERTVU:840137
HistoryOct 04, 2002 - 12:00 a.m.

Microsoft Services for Unix 3.0 Interix SDK vulnerable to buffer overrun via RPC request containing improper parameter size check

2002-10-0400:00:00
www.kb.cert.org
26

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.8%

Overview

Microsoft Services for Unix 3.0 Interix SDK contains a remotely exploitable buffer overflow.

Description

Quoting from Microsoft’s Services for Unix 3.0 homepage, “Windows Services for UNIX version 3.0 provides a full range of cross-platform services for integrating Windows into existing UNIX-based environments.” Interix SDK, “…provides compilers, tools, libraries & debuggers for migrating applications on UNIX to run in a Windows environment.” You might wonder how Windows Services for UNIX and Interix SDK are related. Microsoft states, “The Interix technology provides a UNIX environment that runs on top the Windows kernel, enabling UNIX applications and scripts to run natively on the Windows platform alongside Windows applications. With this capability, an installation can continue to get value out of its UNIX scripts and applications.simply reuse them on Windows.”

A buffer overflow vulnerability in the RPC library can allow an attacker to mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.


Impact

An unauthenticated remote attacker can mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.


Solution

Apply a patch.


Vendor Information

840137

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: October 03, 2002

Status

Affected

Vendor Statement

<http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-057.asp&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23840137 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.microsoft.com/technet/security/bulletin/MS02-057.asp&gt;

Acknowledgements

This document was written by Ian A Finlay. It is based on information provided by Microsoft.

Other Information

CVE IDs: CVE-2002-1140
Severity Metric: 2.81 Date Public:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.8%

Related for VU:840137