| VID |
26037 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The hotfix (Q810577) for the \"Unchecked Buffer in XP Redirector\" is not applied. The Windows Redirector is used by a Windows client to access files, whether local or remote, regardless of the underlying network protocols in use. For example, the "Add a Network Place" Wizard or the NET USE command can be used to map a network share as a local drive, and the Windows Redirector will handle the routing of information to and from the network share. A security vulnerability exists in the implementation of the Windows Redirector on Windows XP because an unchecked buffer is used to receive parameter information. By providing malformed data to the Windows Redirector, a local attacker could overflow the buffer and execute arbitrary code on the system. This could allow a local attacker to obtain an elevation of privileges to the Local SYSTEM.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms03-005.asp
* Platforms Affected: Windows XP |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS03-005, http://www.microsoft.com/technet/security/bulletin/ms03-005.asp |
| Related URL |
CVE-2003-0004 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|