[NT] Remotely Exploitable Buffer Overruns in Microsoft's Commerce Server 2000/2From: firstname.lastname@example.org
- Previous message: email@example.com: "[NT] Argosoft Mail Server Plus/Pro Webmail Reverse Directory Traversal"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com Date: Sun, 7 Jul 2002 00:37:57 +0200 (CEST)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
Remotely Exploitable Buffer Overruns in Microsoft's Commerce Server 2000/2
Microsoft's Commerce Server 2000 and 2002 are web server products for
building e-commerce sites. These products provide tools and features that
simplify the development and deployment of e-commerce solutions and
analyzing site usage and performance. There are several remotely
exploitable buffer overruns in Commerce Server in disparate locations and
a CGI executable that allows the execution of arbitrary commands.
The Profile Service of Microsoft Commerce Server 2000 allows remote
attackers to cause the server to fail or run arbitrary attacker supplied
code in the security context of the Local SYSTEM account. Several areas in
this service contain vulnerable code.
The Office Web Components (OWC) package installer used by Microsoft
Commerce Server 2000 allows remote attackers to cause the process to run
arbitrary code in the LocalSystem security context by via input to the OWC
package installer. By default, users have to authenticate to access this
executable so the risk posed is less severe in nature.
Again, the Office Web Components (OWC) package installer for Microsoft
Commerce Server 2000 allows remote attackers to execute commands by
passing the commands as input to the OWC package installer with a '/C'
NGSSoftware alerted Microsoft to these problems on the 6th March 2002. The
patches are available from:
* Microsoft Commerce Server 2000:
* Microsoft Commerce Server 2002:
The information has been provided by <mailto:firstname.lastname@example.org>
NGSSoftware Insight Security Research.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.