Korean
<< Back
VID 26070
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix(KB828749) for 'Buffer Overrun in the Workstation Service' has not been applied.
The Microsoft Workstation service contains a remotely exploitable buffer overflow in debug and logging code. A remote unauthenticated attacker could exploit this vulnerability to execute arbitrary code with system-level privileges on Windows 2000 and Windows XP machines.
The Workstation service is enabled by default on vulnerable platforms. This service can be reached via named pipes through SMB over NetBIOS, but cannot be reached directly via the endpoint mapper on port 135. The vulnerability can be triggered via null sessions and does not require additional authentication to exploit. The vulnerability is a standard stack overflow, and therefore it may be relatively easy to exploit. Exploits written to take advantage of standard stack overflows are generally very robust, and are good candidates for use in the creation of Internet worms.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* Refereces:
http://www.microsoft.com/technet/security/bulletin/ms03-049.asp
http://xforce.iss.net/xforce/alerts/id/158
http://www.securityfocus.com/archive/1/344137
http://www.eeye.com/html/Research/Advisories/AD20031111.html

* Platforms Affected:
Windows 2000 SP2, SP3, SP4
Windows XP SP1 and earlier
Windows XP 64-Bit Edition
Recommendation Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS03-049 at http://www.microsoft.com/technet/security/bulletin/ms03-049.asp

1. Open the following page :
For Windows 2000:
http://www.microsoft.com/downloads/details.aspx?FamilyId=2467FE46-D167-479C-9638-D4D79483F261
For Windows XP:
http://www.microsoft.com/downloads/details.aspx?FamilyId=F02DA309-4B0A-4438-A0B9-5B67414C3833
For Windows XP 64-Bit Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=2BE95254-4C65-4CA5-80A5-55FDF5AA2296
2. Select a different language from the drop-down list and click <Go> button.
3. Click <Download> button to download this patch file.
4. Run this file to install the patch.

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.

As a workaround, block UDP ports 138, 139, 445 and TCP ports 138, 139, 445 at your firewall.
Related URL CVE-2003-0812 (CVE)
Related URL 9011 (SecurityFocus)
Related URL 13638 (ISS)