Microsoft Services for Unix 3.0 Interix SDK vulnerable to buffer overrun via RPC request containing improper parameter size check

2002-10-04T00:00:00
ID VU:840137
Type cert
Reporter CERT
Modified 2002-10-04T18:25:00

Description

Overview

Microsoft Services for Unix 3.0 Interix SDK contains a remotely exploitable buffer overflow.

Description

Quoting from Microsoft's Services for Unix 3.0 homepage, "Windows Services for UNIX version 3.0 provides a full range of cross-platform services for integrating Windows into existing UNIX-based environments." Interix SDK, "...provides compilers, tools, libraries & debuggers for migrating applications on UNIX to run in a Windows environment." You might wonder how Windows Services for UNIX and Interix SDK are related. Microsoft states, "The Interix technology provides a UNIX environment that runs on top the Windows kernel, enabling UNIX applications and scripts to run natively on the Windows platform alongside Windows applications. With this capability, an installation can continue to get value out of its UNIX scripts and applications.simply reuse them on Windows."

A buffer overflow vulnerability in the RPC library can allow an attacker to mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.


Impact

An unauthenticated remote attacker can mount a denial-of-service attack against the RPC server, causing other requests from legitimate clients to fail.


Solution

Apply a patch.


Vendor Information

840137

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: October 03, 2002

Status

Affected

Vendor Statement

<http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-057.asp>

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

<http://www.microsoft.com/technet/security/bulletin/MS02-057.asp>

Acknowledgements

This document was written by Ian A Finlay. It is based on information provided by Microsoft.

Other Information

CVE IDs: | CVE-2002-1140
---|---
Severity Metric: | 2.81
Date Public: | 2002-10-02
Date First Published: | 2002-10-04
Date Last Updated: | 2002-10-04 18:25 UTC
Document Revision: | 7