lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 10 Nov 2009 13:59:34 -0600 From: dvlabs <dvlabs@...pingpoint.com> To: "'full-disclosure@...ts.grok.org.uk'" <full-disclosure@...ts.grok.org.uk>, "'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com> Subject: TPTI-09-07: Microsoft Windows License Logging Service Heap Corruption Vulnerability TPTI-09-07: Microsoft Windows License Logging Service Heap Corruption Vulnerability http://dvlabs.tippingpoint.com/advisory/TPTI-09-07 November 10, 2009 -- CVE ID: CVE-2009-2523 -- Affected Vendors: Microsoft -- Affected Products: Microsoft Windows 2000 -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 9229. For further product information on the TippingPoint IPS, visit: http://www.tippingpoint.com -- Vulnerability Details: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. Authentication is not required on certain configurations to exploit this vulnerability. The specific flaw exists in the handling of RPC calls to the License Logging Service (llssrv.exe). When processing arguments to the LlsrLicenseRequestW method a character array is expected to contain a terminating null byte. By supplying data that does not end in a null it is possible to overlap a call to lstrcatW, resulting in a heap overflow. Successful exploitation of this vulnerability can lead to remote system compromise under the credentials of the SYSTEM account. -- Vendor Response: Microsoft has issued an update to correct this vulnerability. More details can be found at: http://www.microsoft.com/technet/security/Bulletin/ms09-064.mspx -- Disclosure Timeline: 2009-06-15 - Vulnerability reported to vendor 2009-11-10 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Cody Pierce, TippingPoint DVLabs
Powered by blists - more mailing lists