Overview
A vulnerability in Microsoft Windows Secure Channel security package may lead to execution of arbitrary code.
Description
Microsoft Windows Secure Channel (Schannel) security package implements standard network authentication protocols Secure Sockets Layer (SSL) and Transport Layer Security (TLS). A vulnerability exists in the way Schannel handles specially crafted digital signatures from the server during the SSL handshake, which can result in an integer underflow and heap memory corruption. According to Microsoft Security Bulletin ms07-031: Schannel performs insufficient checks for specially crafted server-sent digital signatures during the SSL handshake. |
Impact
According to Microsoft Security Bulletin ms07-031 this vulnerability affects different versions of Microsoft Windows differently: On Windows XP... An attacker who successfully exploited this vulnerability could remotely take complete control of an affected system. |
Solution
Update |
Do not follow unsolicited links |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported in Microsoft Security Bulletin ms07-031. Microsoft credits Thomas Lim of COSEINC with reporting this issue.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2007-2218 |
Severity Metric: | 24.30 |
Date Public: | 2007-06-12 |
Date First Published: | 2007-06-14 |
Date Last Updated: | 2007-06-14 19:35 UTC |
Document Revision: | 16 |