Overview
A stack buffer overflow vulnerability in the Microsoft Windows Server service may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges.
Description
MS08-067 includes the following information about the Microsoft Server service: The Server service provides RPC support, file print support and named pipe sharing over the network. The Server service allows the sharing of your local resources (such as disks and printers) so that other users on the network can access them. It also allows named pipe communication between applications running on other computers and your computer, which is used for RPC. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges on a vulnerable system. |
Solution
Apply the updates referenced in Microsoft Security Bulletin MS08-067. |
Block or Restrict Access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A |
References
- http://www.microsoft.com/technet/security/Bulletin/ms08-067.mspx
- http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx
- http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx
- http://blogs.msdn.com/sdl/archive/2008/10/22/ms08-067.aspx
- https://www.securecoding.cert.org/confluence/display/seccode/FIO02-C.+Canonicalize+path+names+originating+from+untrusted+sources
- https://www.securecoding.cert.org/confluence/display/seccode/STR31-C.+Guarantee+that+storage+for+strings+has+sufficient+space+for+character+data+and+the+null+terminator
Acknowledgements
Thanks to Microsoft for reporting this vulnerability.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2008-4250 |
Severity Metric: | 88.20 |
Date Public: | 2008-10-23 |
Date First Published: | 2008-10-23 |
Date Last Updated: | 2009-11-02 22:36 UTC |
Document Revision: | 30 |