[NT] Microsoft Windows LPC Heap Overflow
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 11 Jan 2005 14:06:07 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Microsoft Windows LPC Heap Overflow
A local privilege elevation vulnerability exists on the Windows operating
systems' LPC mechanism. This vulnerability allows any user to take
complete control over the system and affects Windows NT, Windows 2000,
Windows XP, and Windows 2003 (all service packs).
The LPC (Local Procedure Call) mechanism is a type of interprocess
communication used by the Windows operating systems. LPC is used to
communicate between processes running on the same system while RPC (Remote
Procedure Call) is used to communicate between processes on remote
When a client process communicates with a server using LPC, the kernel
fails to check that the server process has allocated enough memory before
copying data sent by the client process. The native API used to connect to
the LPC port is NtConnectPort. A parameter of the NtConnectPort API allows
a buffer of up 260 bytes. When using this function the buffer is copied by
the kernel from the client process to the server process memory ignoring
the buffer size restriction which the server process set when calling
NtCreatePort (the native API used to create LPC ports). This causes a heap
corruption in the server process allowing arbitrary memory to be
overwritten and can lead to arbitrary
See solution provided at:
The information has been provided by <mailto:firstname.lastname@example.org> Team
SHATTER (Application Security, Inc.).
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.