Microsoft Windows NetDDE Agent can be used to gain elevated privileges

win-netdde-gain-privileges (10343) The risk level is classified as MediumMedium Risk

Description:

The NetDDE Agent in Microsoft Windows 2000, Windows NT, and Windows XP could be used by a local attacker to gain elevated privileges on the system. A local attacker could send malicious shell code to the NetDDE Agent using a WM_COPYDATA message, and then send a WM_TIMER message to cause the shell code to be executed on the system with elevated privileges.


Consequences:

Gain Privileges

Remedy:

Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS02-071. See References.

For Windows 2000:
Microsoft originally provided a patch for this vulnerability in MS02-071, but it has been superseded by the patch released with MS04-011. Note: Microsoft is reporting that MS02-071 has been superseded by the patch released with MS04-031. Microsoft is also reporting that MS02-071 has been superseded by the patch released with MS04-032. See References.

For Windows NT:
Microsoft originally provided a patch for this vulnerability in MS02-071, but it has been superseded by the patch released with MS04-011. Microsoft is also reporting that MS02-071 has been supersede by the patch released with MS04-032. See References.

Note: It has been reported on some systems this patch could cause the system to crash without warning. See References.

References:

Platforms Affected:

  • Microsoft Windows 2000
  • Microsoft Windows NT 4.0
  • Microsoft Windows NT 4.0 Terminal Server
  • Microsoft Windows XP

Reported:

Oct 06, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page