Microsoft Windows Winlogon Command Execution

2004-04-13T17:50:33
ID OSVDB:5251
Type osvdb
Reporter Ondrej Sevecek()
Modified 2004-04-13T17:50:33

Description

Vulnerability Description

A remote overflow exists in Windows. The Windows logon process fails to validate a user-supplied value resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

Short Description

A remote overflow exists in Windows. The Windows logon process fails to validate a user-supplied value resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.

References:

US-CERT Cyber Security Alert: TA04-104A Security Tracker: 1009768 Secunia Advisory ID:11064 Related OSVDB ID: 5261 Related OSVDB ID: 5254 Related OSVDB ID: 5255 Related OSVDB ID: 5256 Related OSVDB ID: 5260 Related OSVDB ID: 5249 Related OSVDB ID: 5257 Related OSVDB ID: 5248 Related OSVDB ID: 5250 Related OSVDB ID: 5252 Related OSVDB ID: 5253 Related OSVDB ID: 5258 Related OSVDB ID: 5259 OVAL ID: 895 OVAL ID: 1054 OVAL ID: 896 Nessus Plugin ID:12209 Microsoft Security Bulletin: MS04-011 ISS X-Force ID: 15818 CVE-2003-0806 CIAC Advisory: o-114 CERT VU: 471260