[LSD] Critical security vulnerability in Microsoft Operating Systems

From: Last Stage of Delirium (contact_at_LSD-PL.NET)
Date: 07/17/03

  • Next message: http-equiv_at_excite.com: "Re: Microsoft ISA Server HTTP error handler XSS (TL#007)"
    Date:         Wed, 16 Jul 2003 22:48:44 -0700
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Hello,

    We have discovered a critical security vulnerability in all recent versions of
    Microsoft operating systems. The vulnerability affects default installations
    of Windows NT 4.0, Windows 2000, Windows XP as well as Windows 2003 Server.

    This is a buffer overflow vulnerability that exists in an integral component of
    any Windows operating system, the RPC interface implementing Distributed Component
    Object Model services (DCOM). In a result of implementation error in a function
    responsible for instantiation of DCOM objects, remote attackers can obtain
    unauthorized access to vulnerable systems.

    The existence of the vulnerability has been confirmed by Microsoft Corporation.
    The appropriate security bulletin as well as fixes for all affected platforms
    are available for download from http://www.microsoft.com/security/ (MS03-026).

    It should be emphasized that this vulnerability poses an enormous threat and
    appropriate patches provided by Microsoft should be immediately applied.

    We have decided not to publish codes or any technical details with regard to
    this vulnerability at the moment.

    With best regards,
    Members of
    The Last Stage of Delirium
    Research Group

    http://lsd-pl.net

    oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
    Are You "Certifiable"? Summer's Hottest Certification Just Got HOTTER!

    With a growth rate exceeding 110%, the TICSA security practitioner
    certification is one of the hottest IT credentials available. And now, for
    a limited time, you can save 33% off of the TICSA certification exam! To
    learn more about the TICSA certification, and to register as a TICSA
    candidate online, just go to

    http://www.trusecure.com/offer/s0100/

    oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo


  • Next message: http-equiv_at_excite.com: "Re: Microsoft ISA Server HTTP error handler XSS (TL#007)"

    Relevant Pages

    • SecurityFocus Microsoft Newsletter #163
      ... MICROSOFT VULNERABILITY SUMMARY ... Bugzilla Javascript Buglists Remote Information Disclosure V... ... Microsoft Internet Explorer DHTML Drag and Drop Local File S... ... Microsoft Windows Workstation Service Remote Buffer Overflow... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #176
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #158
      ... Gamespy 3d IRC Client Remote Buffer Overflow Vulnerability ... Microsoft Windows PostThreadMessage() Arbitrary Process Kill... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #123
      ... Spooked about Windows security? ... Rediff Bol URL Handling Denial Of Service Vulnerability ... Finjan SurfinGate File Extension File Filter Circumvention... ... MIT Kerberos Key Distribution Center Remote Format String... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #177
      ... RobotFTP Server Username Buffer Overflow Vulnerability ... Ipswitch IMail Server Remote LDAP Daemon Buffer Overflow Vul... ... Microsoft Windows XP Help And Support Center Interface Spoof... ...
      (Focus-Microsoft)