NSFOCUS SA2002-02 : Microsoft Windows MUP overlong request kernel overflow

From: Nsfocus Security Team (security@NSFOCUS.COM)
Date: 04/04/02


Date:         Thu, 4 Apr 2002 16:57:37 +0800
From: Nsfocus Security Team <security@NSFOCUS.COM>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM

NSFOCUS Security Advisory(SA2002-02)

Topic: Microsoft Windows MUP overlong request kernel overflow

Release Date: 2002-4-04

CVE CAN ID : CAN-2002-0151

Affected system:
===================

Microsoft Windows NT 4.0
Microsoft Windows 2000
Microsoft Windows XP

Impact:
=========

NSFOCUS Security Team has found a buffer overflow vulnerability in the Multiple
UNC Provider (MUP) driver of Microsoft Windows systems which would lead to
system reboot or unauthorized access of Local SYSTEM by a local attacker.

Description:
============

When applications in Microsoft Windows NT/2000/XP system send UNC request(ie:
\\ip\sharename)to access files on other hosts, the operation system would pass
the request to be processed by Multiple UNC Provider(MUP). MUP passes the
request to several redirectors and subsequently select an appropriate redirector
according to their responds. MUP is implemented by mup.sys in kernel.

When receiving a UNC file request, MUP first saves it in a buffer of the kernel,
which has a size of UNC request length + 0x1000 bytes. Before sending the request
to a redirector, MUP would copy it to the buffer again, attaching behind the
original one. In case that the file request is longer than 0x1000 bytes, it
would overwrite memory data outside of the buffer. Usually, some management
data structure would be stored in the border of dynamic allocated memory.
An attacker might modify arbitrary kernel memory content by overwriting the
data and waiting till the kernel malloc/free the memory.

Exploiting this vulnerability successfully, a local attacker could obtain Local
SYSTEM or any other priviledge. So far as we know from our testing, it is
exploitable on Windows 2000. But the exploit won't always work because it
depends on the kernel to process the overwritten data, which is beyond
human control. With random data, the system might have a blue screen and reboot.
The same vulnerability also exists in Windows NT and XP, exploitment of which
is even more difficult.

Workaround:
=============

 Block untrusted user login.

Vendor Status:
==============

2001.10.17 We have informed Microsoft of this issue.
2001.11.09 Microsoft replied that the problem had been reproduced.
2001.12.05 Microsoft provided patches for testing, in which the problem was
            fixed.
2002.4.4 Microsoft issued a security bulletin (MS02-017) and relevant patches
            for the problem.

The bulletin is live at :

http://www.microsoft.com/technet/security/bulletin/MS02-017.asp

Patches are available at:

. Microsoft Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37630

. Microsoft Windows NT 4.0 Terminal Server Edition:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37652

. Microsoft Windows 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37555

. Microsoft Windows XP:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37583

Additional Information:
========================

The Common Vulnerabilities and Exposures (CVE) project has
assigned the name CAN-2002-0151 to this issue. This is a
candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems. Candidates
may change significantly before they become official CVE entries.

DISCLAIMS:
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENTSHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2002 NSFOCUS. All Rights Reserved. Terms of use.

NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)



Relevant Pages