MS Sec Notification mailing list archives

Microsoft Security Bulletin MS03-027: Unchecked Buffer in Windows Shell Could Enable System Compromise (Q821557)


From: "Microsoft" <0_50145_04BF067D-4CF8-4245-B5C1-58573E5746A8_US () Newsletters Microsoft com>
Date: Wed, 16 Jul 2003 13:09:09 -0700

-----BEGIN PGP SIGNED MESSAGE-----

- - ---------------------------------------------------------------
Title:      Unchecked Buffer in Windows Shell Could Enable System 
            Compromise (821557)
Date:       16 July 2003
Software:   Microsoft(r) Windows (r) XP 
Impact:     Run code of attacker's choice
Max Risk:   Important
Bulletin:   MS03-027

Microsoft encourages customers to review the Security Bulletins 
at: 
http://www.microsoft.com/technet/security/bulletin/MS03-027.asp
http://www.microsoft.com/security/security_bulletins/MS03-027.asp
- - ---------------------------------------------------------------

Issue:
======

The Windows shell is responsible for providing the basic 
framework of the Windows user interface experience. It is most 
familiar to users as the Windows desktop. It also provides a 
variety of other functions to help define the user's computing 
session, including organizing files and folders, and providing 
the means to start programs. 

An unchecked buffer exists in one of the functions used by the 
Windows shell to extract custom attribute information from 
certain folders. A security vulnerability results because it is 
possible for a malicious user to construct an attack that could 
exploit this flaw and execute code on the user's system. 

An attacker could seek to exploit this vulnerability by creating 
a Desktop.ini file that contains a corrupt custom attribute, and 
then host it on a network share. If a user were to browse the 
shared folder where the file was stored, the vulnerability could 
then be exploited. A successful attack could have the effect of 
either causing the Windows shell to fail, or causing an 
attacker's code to run on the user's computer in the security 
context of the user. 

Mitigating factors: 
====================

 - In the case where an attacker's code was executed, the code 
would run in the security context of the user. As a result, any 
limitations on the user's ability would also restrict the actions 
that an attacker's code could take. 

 - An attacker could only seek to exploit this vulnerability by 
hosting a malicious file on a share. 

 - This vulnerability only affects Windows XP Service Pack 1. 
Users running Windows XP Gold are not affected. 

Risk Rating:
============
Important

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read 
the  Security Bulletins at
   
http://www.microsoft.com/technet/security/bulletin/ms03-027.asp
http://www.microsoft.com/security/security_bulletins/ms03-027.asp
   
   for information on obtaining this patch.


- - ---------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT 
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING 
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS 
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, 
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL 
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN 
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT 
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL 
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPxSk+Y0ZSRQxA/UrAQFfOQgAkkCMAzGtqzcgOEyOG95ucuotlSYbHrYY
7fIhOmZySzRJpqid36aW1lcpNKEGFsra8CSz+7oNnECrsu8B4/F9ZgDxj6X6mE/+
Ya3Y6bx4o40fvd6Wa9EzGrCr87j3z5ugr3yNpEo0vBmlIOVA+rjcHpltZeC+oCBJ
fsvma8dt/ChVlMCk+mbcTn5DmCRP2pKeoB3C5DiWM7MxrdASwG7FoKN9Ql0wBTab
P8EHq3qcdTxz4zHI6xVJfbPrTojNoq0oH05tiETp29k47xI1/8Bboc/azeISoCjc
BMVIeZyvYgxSS2Zte7XF9tNg4MgUxkY4UIJLcMcY1jH5G+2cyDa43A==
=+K+K
-----END PGP SIGNATURE-----


*******************************************************************

You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification 
Service.  For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP key at 
http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at 
http://register.microsoft.com/regsys/pic.asp 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via 
email as described below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at 
http://www.microsoft.com/security.


Current thread: