Unchecked Buffer in XP Shell Could Enable System Compromise (329390). Malicious user can mount buffer overrun attack in Windows XP Shell, leading to system failure or execution of attacker's code in user's security context. Admins should install patch immediately
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2002-1327 | 1 Sep 200404:00 | – | cve |
![]() | Foundstone Research Labs Advisory - Exploitable Windows XP Media Files (fwd) | 19 Dec 200200:00 | – | securityvulns |
![]() | CVE-2002-1327 | 26 Dec 200205:00 | – | nvd |
![]() | MS02-072: Unchecked Buffer in XP Shell Could Enable System Compromise (329390) | 19 Dec 200200:00 | – | nessus |
![]() | Buffer overflow in Microsoft Windows Shell | 19 Dec 200200:00 | – | cert |
![]() | CVE-2002-1327 | 1 Sep 200404:00 | – | cvelist |
![]() | Unchecked Buffer in XP Shell Could Enable System Compromise (329390) | 3 Nov 200500:00 | – | openvas |
# OpenVAS Vulnerability Test
# $Id: smb_nt_ms02-072.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: Unchecked Buffer in XP Shell Could Enable System Compromise (329390)
#
# Authors:
# Michael Scheidell SECNAP Network Security
#
# Copyright:
# Copyright (C) 2002 SECNAP Network Security, LLC
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
tag_summary = "It is possible for a malicious user to mount a buffer
overrun attack using windows XP shell.
A successful attack could have the effect of either causing
the Windows Shell to fail, or causing an attacker's code to run on
the user's computer in the security context of the user.
Maximum Severity Rating: Critical
Recommendation: Administrators should install the patch immediately.
Affected Software:
Microsoft Windows XP.
See
http://www.microsoft.com/technet/security/bulletin/ms02-072.mspx";
if(description)
{
script_id(11194);
script_version("$Revision: 8023 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_bugtraq_id(6427);
script_cve_id("CVE-2002-1327");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
name = "Unchecked Buffer in XP Shell Could Enable System Compromise (329390)";
script_name(name);
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"registry");
script_copyright("This script is Copyright (C) 2002 SECNAP Network Security, LLC");
family = "Windows : Microsoft Bulletins";
script_family(family);
script_dependencies("secpod_reg_enum.nasl");
script_require_keys("SMB/Registry/Enumerated");
script_mandatory_keys("SMB/WindowsVersion");
script_require_ports(139, 445);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
include("secpod_reg.inc");
if ( hotfix_check_sp(xp:2) <= 0 ) exit(0);
if ( hotfix_missing(name:"Q329390") > 0 )
security_message(get_kb_item("SMB/transport"));
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo