Korean
<< Back
VID 26045
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (KB822679) for the "Privilege Elevation Vulnerability in Windows Message Handling through Utility Manager" has not been applied.
"Accessibility utilities" assists in enabling those with disabilities to use the features of the products and "Utility Manager" allows users to check the status of accessibility programs (Microsoft Magnifier, Narrator, On-Screen Keyboard) and to start or stop them. There is a flaw that Utility Manager does not properly handles Windows messages when presenting the list of available accessibility functions to the user. This flaw is allow for an unprivileged user to cause code to be executed by a highly privileged process on the interactive desktop using Utility Manager in combination with a specially crafted Windows message. Exploiting successfully this vulnerability, the attacker could gain full administrative privileges, thereby gaining the ability to take any action they want on the machine, such as adding, deleting, or modifying data on the system, creating or deleting user accounts, and adding accounts to the local administrators group.

* Note: The attack cannot be exploited remotely, and the attacker would have to have the ability to interactively log on to the system. This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/MS03-025.asp
http://www.securityfocus.com/archive/1/328529

* Platforms Affected:
Microsoft Windows 2000
Recommendation Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS03-025, http://www.microsoft.com/technet/security/bulletin/MS03-025.asp

1. Open the page : http://microsoft.com/downloads/details.aspx?FamilyId=D415A4AC-E13A-4E8A-BE25-85E7DF686F61&displaylang=en
2. Select your language from the drop-down list at the top of the page and then click <Go> button.
3. Click <Download> button to download this patch file.
4. Run this file to install the patch.
5. Reboot your system to complete installation.

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2003-0350 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)