[NT] Microsoft Windows LPC Heap Overflow

From: SecuriTeam (support_at_securiteam.com)
Date: 01/11/05

  • Next message: SecuriTeam: "[NT] Vulnerability in Cursor and Icon Format Handling Allows Remote Code Execution (MS05-002)"
    To: list@securiteam.com
    Date: 11 Jan 2005 14:06:07 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Microsoft Windows LPC Heap Overflow
    ------------------------------------------------------------------------

    SUMMARY

    A local privilege elevation vulnerability exists on the Windows operating
    systems' LPC mechanism. This vulnerability allows any user to take
    complete control over the system and affects Windows NT, Windows 2000,
    Windows XP, and Windows 2003 (all service packs).

    DETAILS

    The LPC (Local Procedure Call) mechanism is a type of interprocess
    communication used by the Windows operating systems. LPC is used to
    communicate between processes running on the same system while RPC (Remote
    Procedure Call) is used to communicate between processes on remote
    systems.

    When a client process communicates with a server using LPC, the kernel
    fails to check that the server process has allocated enough memory before
    copying data sent by the client process. The native API used to connect to
    the LPC port is NtConnectPort. A parameter of the NtConnectPort API allows
    a buffer of up 260 bytes. When using this function the buffer is copied by
    the kernel from the client process to the server process memory ignoring
    the buffer size restriction which the server process set when calling
    NtCreatePort (the native API used to create LPC ports). This causes a heap
    corruption in the server process allowing arbitrary memory to be
    overwritten and can lead to arbitrary
    code execution.

    Solution:
    See solution provided at:
    <http://www.microsoft.com/technet/security/bulletin/MS04-044.mspx>
    http://www.microsoft.com/technet/security/bulletin/MS04-044.mspx

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:vrathod@appsecinc.com> Team
    SHATTER (Application Security, Inc.).
    The original article can be found at:
    <http://www.appsecinc.com/resources/alerts/general/07-0001.html>
    http://www.appsecinc.com/resources/alerts/general/07-0001.html

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NT] Vulnerability in Cursor and Icon Format Handling Allows Remote Code Execution (MS05-002)"

    Relevant Pages

    • [NT] Windows Embedded Open Type (EOT) Font Heap Overflow
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A vulnerability in the way that Windows uncompresses Embedded Open Type ... fonts allow the author of a malicious web page to execute arbitrary code ... A heap overflow vulnerability exists in T2EMBED.DLL, ...
      (Securiteam)
    • [NT] Windows VDM #UD Local Privilege Escalation
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... vulnerability to fully compromise a Windows NT 4.0, Windows 2000, Windows ... 32-bit VDM "host" code, and the invalid opcode fault handler within the ... process).The kernel does not validate the address to which execution is ...
      (Securiteam)
    • [NT] Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability (MS08-046)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Windows Color Management Module Heap Buffer Overflow ... vulnerability in multiple versions of Microsoft Corp.'s Windows operating ... Keep in mind that this only blocks the attack vector through Windows ...
      (Securiteam)
    • [NT] Windows Workstation Service Remote Buffer Overflow (Exploit)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The Windows Workstation Creates and maintains client network connections ... the log file. ... The string arguments for this logging function are supplied as ...
      (Securiteam)
    • [REVS] Removing about:blank Homepage Hijacker
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... expanded with almost a dozen other checks against hijacker tricks. ... To Remove "About:Blank" Hijacker Adware In Windows XP Home edition Service ... The "value" window reveals the hidden file name. ...
      (Securiteam)