Microsoft Windows内核消息处理本地缓冲区溢出漏洞(MS03-013)

漏洞信息详情

Microsoft Windows内核消息处理本地缓冲区溢出漏洞(MS03-013)

漏洞简介

Windows内核是操作系统核心部分,提供系统级别服务如设备和内存管理,分配处理器时间和管理错误处理。
Windows内核在处理错误消息给调试器时存在一个缺陷,本地攻击者可以利用这个漏洞在系统中进行任何操作,如删除数据,增加管理员访问级别帐户或重新配置系统。
在内核调试支持代码传递调试事件给用户模式调试器时存在漏洞。LpcRequestWaitReplyPort()函数由内核调用,不适当的信任用户空间进程报告给内核的消息大小,利用这个漏洞,攻击者精心构建事件消息可能以\”Ring0\”级执行任意代码,即对所有系统资源访问没有任何限制。

漏洞公告

厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS03-013)以及相应补丁:

MS03-013:Buffer Overrun in Windows Kernel Message Handling could Lead to Elevated Privileges (811493)

链接:http://www.microsoft.com/technet/security/bulletin/MS03-013.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS03-013.asp

补丁下载:

Microsoft Windows 2000 Professional SP3:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Server SP3:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Advanced Server SP3:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Terminal Services SP3:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Datacenter Server SP3:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Advanced Server SP2:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Datacenter Server SP2:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Professional SP2:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Server SP2:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows 2000 Terminal Services SP2:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en

All except Japanese NEC

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja

Japanese NEC

Microsoft Windows XP Home SP1:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en

Microsoft Windows XP Professional SP1:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en

Microsoft Windows XP 64-bit Edition SP1:

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en

Microsoft Windows XP 64-bit Edition :

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en

Microsoft Windows XP Professional :

Microsoft Patch Q811493

http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com


参考网址

来源:US-CERT Vulnerability Note: VU#446338
名称: VU#446338
链接:http://www.kb.cert.org/vuls/id/446338

来源: BID
名称: 7370
链接:http://www.securityfocus.com/bid/7370

来源: MS
名称: MS03-013
链接:http://www.microsoft.com/technet/security/bulletin/MS03-013.asp

来源: XF
名称: win-kernel-lpcrequestwaitreplyport-bo(11803)
链接:http://xforce.iss.net/xforce/xfdb/11803

来源: US Government Resource: oval:org.mitre.oval:def:779
名称: oval:org.mitre.oval:def:779
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:779

来源: US Government Resource: oval:org.mitre.oval:def:3145
名称: oval:org.mitre.oval:def:3145
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:3145

来源: US Government Resource: oval:org.mitre.oval:def:262
名称: oval:org.mitre.oval:def:262
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:262

来源: US Government Resource: oval:org.mitre.oval:def:2265
名称: oval:org.mitre.oval:def:2265
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2265

来源: US Government Resource: oval:org.mitre.oval:def:2022
名称: oval:org.mitre.oval:def:2022
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2022

来源: US Government Resource: oval:org.mitre.oval:def:142
名称: oval:org.mitre.oval:def:142
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:142

来源: US Government Resource: oval:org.mitre.oval:def:1264
名称: oval:org.mitre.oval:def:1264
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1264

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享