Secunia Security Advisory - Some vulnerabilities have been reported in the Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.
70ca029addbeddade618919711c18da208452656cc11692b5bd5cd26261bbb86
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Microsoft Windows Kernel Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA14927
VERIFY ADVISORY:
http://secunia.com/advisories/14927/
CRITICAL:
Less critical
IMPACT:
Privilege escalation, DoS
WHERE:
Local system
OPERATING SYSTEM:
Microsoft Windows XP Professional
http://secunia.com/product/22/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows Millenium
http://secunia.com/product/14/
Microsoft Windows 98 Second Edition
http://secunia.com/product/13/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/
DESCRIPTION:
Some vulnerabilities have been reported in the Microsoft Windows,
which can be exploited by malicious, local users to cause a DoS
(Denial of Service) or gain escalated privileges.
1) A boundary error within the processing of certain font files can
be exploited to cause a buffer overflow and gain escalated privileges
by loading a malicious font.
2) An error in the validation of certain access requests in the
Windows Kernel can be exploited to gain escalated privileges by
running a specially crafted program.
3) A boundary error in the Object Management can be exploited to
cause the system to stop responding and restart by running a
specially crafted program.
4) An error within the validation of certain messages in CSRSS
(Client Server Runtime System) can be exploited to gain escalated
privileges by running a specially crafted program.
SOLUTION:
Apply patches.
Microsoft Windows 2000 (requires Service Pack 3 or Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=992C1BF9-A2C0-49D2-9059-A1DAD6703213
Microsoft Windows XP (requires Service Pack 1 or Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=F0683E2B-8E8F-474F-B8D8-46C4C33FCE99
Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium):
http://www.microsoft.com/downloads/details.aspx?FamilyId=B52F9281-570F-4F7A-8DEF-5AEAB6E8E002
Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium):
http://www.microsoft.com/downloads/details.aspx?FamilyId=C51D6AD5-93BA-4717-A5DB-5CE78F70592E
Microsoft Windows Server 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=E66332D4-3952-428F-AC62-AC8124F8942A
Microsoft Windows Server 2003 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=C51D6AD5-93BA-4717-A5DB-5CE78F70592E
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and
Microsoft Windows Millennium Edition (ME):
See original advisory.
The following versions of Microsoft Windows are not affected:
* Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows XP Professional x64 Edition
PROVIDED AND/OR DISCOVERED BY:
1) John Heasman with Next Generation Security Software Ltd
2) Sanjeev Radhakrishnan, Amit Joshi, and Ananta Iyengar with
GreenBorder Technologies
4) David Fritz
ORIGINAL ADVISORY:
MS05-018 (KB890859):
http://www.microsoft.com/technet/security/Bulletin/MS05-018.mspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------