Korean
<< Back
VID 26033
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (Q328310) for the "WM_TIMER Privilege Elevation" problem is not applied.
NetDDE Agent on Windows Platforms allows local users to execute arbitrary code as LocalSystem via "shatter" style attack by sending a WM_COPYDATA message followed by a WM_TIMER message.

Windows messages provide a way for interactive processes to react to user events (e.g., keystrokes or mouse movements) and communicate with other interactive processes. One such message, WM_TIMER, is sent at the expiration of a timer, and can be used to cause a process to execute a timer callback function. A security vulnerability results because it's possible for one process in the interactive desktop to use a WM_TIMER message to cause another process to execute a callback function at the address of its choice, even if the second process did not set a timer. If that second process had higher privileges than the first, this would provide the first process with a way of exercising them.

By default, several of the processes running in the interactive desktop do so with LocalSystem privileges. As a result, an attacker who had the ability to log onto a system interactively could potentially run a program that would levy a WM_TIMER request upon such a process, causing it to take any action the attacker specified. This would give the attacker complete control over the system.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms02-071.asp
http://online.securityfocus.com/bid/5927

* Platforms Affected:
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0, Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS02-071, http://www.microsoft.com/technet/security/bulletin/ms02-071.asp
Related URL CVE-2002-1230 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)