what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA-2002-33.MDAC

CA-2002-33.MDAC
Posted Nov 24, 2002
Site cert.org

CERT Advisory CA-2002-33 - Heap Overflow Vulnerability in Microsoft Data. A routine in the RDS component, specifically the RDS Data Stub function, contains an unchecked buffer. The RDS Data Stub function's purpose is to parse incoming HTTP requests and generate RDS commands. This unchecked buffer could be exploited to cause a heap overflow.

tags | web, overflow
SHA-256 | 3545b3ca951a5477fd7faa99a4548d9b9e2f7fa3d5d6c97fe2714ab53ca3f119

CA-2002-33.MDAC

Change Mirror Download


-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-33 Heap Overflow Vulnerability in Microsoft Data
Access Components (MDAC)

Original release date: November 21, 2002
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

All Microsoft Windows systems running the following:
* Versions of Microsoft Data Access Components (MDAC) prior to 2.7
* Internet Explorer version 6
* Internet Explorer version 5.5
* Internet Explorer version 5.1

Note that Microsoft Windows XP is shipped with MDAC version 2.7 and is
not vulnerable by default even though Internet Explorer 6.0 is
installed.

Because the normal operation of several applications and web servers
on a system depend on the proper operation of the MDAC ActiveX
control, other programs could be used as an exploit vector. For
example, Internet Information Server may be configured to use MDAC.

Overview

A vulnerability in the Microsoft Data Access Components (MDAC) could
lead to remote execution of code with the privileges of the current
process or user.

I. Description

Microsoft Data Access Components (MDAC) is a collection of utilities
and routines to process requests between databases and network
applications. A buffer overflow vulnerability exists in the Remote
Data Services (RDS) component of MDAC.

The RDS component provides an intermediary step for a client's request
for service from a back-end database that enables the web site to
apply business logic to the request.

According to Microsoft's Security Bulletin MS02-065, a routine in the
RDS component, specifically the RDS Data Stub function, contains an
unchecked buffer. The RDS Data Stub function's purpose is to parse
incoming HTTP requests and generate RDS commands. This unchecked
buffer could be exploited to cause a heap overflow.

There are two ways in which this vulnerability can be exploited. The
first involves an attacker sending a malicious HTTP request to a
vulnerable service, such as an IIS server. If RDS is enabled, the
attacker can execute arbitrary code as the IIS server. RDS is not
enabled by default on Windows 2000 and Windows XP systems. It can be
disabled on other systems by following the advice in Microsoft's
security bulletin.

The other way to exploit this vulnerability involves a malicious web
site hosting a page that exploits the buffer overflow in the MDAC RDS
stub through a client application, such as Internet Explorer. Most
systems running Internet Explorer on operating systems other than
Windows XP are vulnerable to this attack. The attacker is able to run
arbitrary code as the user viewing the malicious web page.

Both web servers and client applications that rely on MDAC are
affected. It is recommended that all users of Microsoft Windows 98,
Windows 98 SE, Windows ME, Windows NT 4.0, and Windows 2000 apply the
patch (Q329414). Windows XP users are not affected since MDAC 2.7, the
non-vulnerable version, is installed by default.

Information about this vulnerability is discussed in VU#542081. This
issue is also being referenced as CAN-2002-1142.

II. Impact

A remote attacker could execute arbitrary code with the privileges of
the application that processed the request.

In the case of a web server or other service, this is likely to be the
SYSTEM or another account with elevated privileges. In the case of a
client application, this will be the account used to view the web
page.

III. Solution

Apply a patch from your vendor.

Microsoft has released a patch (Q329414) and a security bulletin
(MS02-065) to address this issue. An end-user version of MS02-065 is
available at
http://www.microsoft.com/security/security_bulletins/ms02-065.asp.

According to the Microsoft advisory, a scenario exists in by which a
vulnerable version of the control may be re-installed on a Windows
system even after the patch has been applied. This is due to the fact
that the vulnerable ActiveX control is signed by Microsoft and the
patch does not set the kill bit for the MDAC control.
_________________________________________________________________

This vulnerability was reported in an advisory by Foundstone and in
MS02-065 by Microsoft.
_________________________________________________________________

Feedback can be sent to the Authors: Jason A. Rafail, Chad R.
Dougherty, and Cory F. Cohen.
______________________________________________________________________

This document is available from:
http://www.cert.org/advisories/CA-2002-33.html
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from
http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from
our web site
http://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins,
send email to majordomo@cert.org. Please include in the body of your
message

subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________

Conditions for use, disclaimers, and sponsorship information

Copyright 2002 Carnegie Mellon University.

Revision History
November 21, 2002: Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPd1NYGjtSoHZUTs5AQHUzAQAxi1VWaNhv/9ihPvBWXPU/NmrQxcF3AGx
SCtW1Lsgs7b0LHeNFKwEYxQu7nBGoc4otgQ1oVj+ftrJwOHSA560qPB9Pbu7doSG
7Hql8T/LdOGgcRIAPmLPvAK1rDT2oN85S/adpaQgFRgQw7RYLMsgjCKmQivpCpDA
/8Vb+bI52YU=
=3mho
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close