漏洞信息详情
Microsoft Windows内核消息处理本地缓冲区溢出漏洞(MS03-013)
- CNNVD编号:CNNVD-200305-019
- 危害等级: 中危
- CVE编号:
CVE-2003-0112
- 漏洞类型:
边界条件错误
- 发布时间:
2003-04-17
- 威胁类型:
本地
- 更新时间:
2005-10-20
- 厂 商:
microsoft - 漏洞来源:
Entercept Security… -
漏洞简介
Windows内核是操作系统核心部分,提供系统级别服务如设备和内存管理,分配处理器时间和管理错误处理。
Windows内核在处理错误消息给调试器时存在一个缺陷,本地攻击者可以利用这个漏洞在系统中进行任何操作,如删除数据,增加管理员访问级别帐户或重新配置系统。
在内核调试支持代码传递调试事件给用户模式调试器时存在漏洞。LpcRequestWaitReplyPort()函数由内核调用,不适当的信任用户空间进程报告给内核的消息大小,利用这个漏洞,攻击者精心构建事件消息可能以\”Ring0\”级执行任意代码,即对所有系统资源访问没有任何限制。
漏洞公告
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS03-013)以及相应补丁:
MS03-013:Buffer Overrun in Windows Kernel Message Handling could Lead to Elevated Privileges (811493)
链接:http://www.microsoft.com/technet/security/bulletin/MS03-013.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS03-013.asp
补丁下载:
Microsoft Windows 2000 Professional SP3:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Server SP3:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Advanced Server SP3:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Terminal Services SP3:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Datacenter Server SP3:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Advanced Server SP2:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Datacenter Server SP2:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Professional SP2:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Server SP2:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows 2000 Terminal Services SP2:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=CACAC8C0-81E9-413E-B565-5D7B3257A733&displaylang=en
All except Japanese NEC
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=81E6E80C-5E56-4466-98C1-4DDF6CF3893F&displaylang=ja
Japanese NEC
Microsoft Windows XP Home SP1:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en
Microsoft Windows XP Professional SP1:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en
Microsoft Windows XP 64-bit Edition SP1:
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en
Microsoft Windows XP 64-bit Edition :
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=DBC47904-51C8-475A-9900-3DF363A51A3A&displaylang=en
Microsoft Windows XP Professional :
Microsoft Patch Q811493
http://microsoft.com/downloads/details.aspx?FamilyId=9F81E615-3DEC-4A4B-826A-4E0FEAB42323&displaylang=en” target=”_blank”>
http://microsoft.com
参考网址
来源:US-CERT Vulnerability Note: VU#446338
名称: VU#446338
链接:http://www.kb.cert.org/vuls/id/446338
来源: BID
名称: 7370
链接:http://www.securityfocus.com/bid/7370
来源: MS
名称: MS03-013
链接:http://www.microsoft.com/technet/security/bulletin/MS03-013.asp
来源: XF
名称: win-kernel-lpcrequestwaitreplyport-bo(11803)
链接:http://xforce.iss.net/xforce/xfdb/11803
来源: US Government Resource: oval:org.mitre.oval:def:779
名称: oval:org.mitre.oval:def:779
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:779
来源: US Government Resource: oval:org.mitre.oval:def:3145
名称: oval:org.mitre.oval:def:3145
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:3145
来源: US Government Resource: oval:org.mitre.oval:def:262
名称: oval:org.mitre.oval:def:262
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:262
来源: US Government Resource: oval:org.mitre.oval:def:2265
名称: oval:org.mitre.oval:def:2265
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2265
来源: US Government Resource: oval:org.mitre.oval:def:2022
名称: oval:org.mitre.oval:def:2022
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2022
来源: US Government Resource: oval:org.mitre.oval:def:142
名称: oval:org.mitre.oval:def:142
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:142
来源: US Government Resource: oval:org.mitre.oval:def:1264
名称: oval:org.mitre.oval:def:1264
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1264