Microsoft Windows NetDDE Agent can be used to gain elevated privileges
|win-netdde-gain-privileges (10343)||Medium Risk|
The NetDDE Agent in Microsoft Windows 2000, Windows NT, and Windows XP could be used by a local attacker to gain elevated privileges on the system. A local attacker could send malicious shell code to the NetDDE Agent using a WM_COPYDATA message, and then send a WM_TIMER message to cause the shell code to be executed on the system with elevated privileges.
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS02-071. See References.
For Windows 2000:
Microsoft originally provided a patch for this vulnerability in MS02-071, but it has been superseded by the patch released with MS04-011. Note: Microsoft is reporting that MS02-071 has been superseded by the patch released with MS04-031. Microsoft is also reporting that MS02-071 has been superseded by the patch released with MS04-032. See References.
For Windows NT:
Microsoft originally provided a patch for this vulnerability in MS02-071, but it has been superseded by the patch released with MS04-011. Microsoft is also reporting that MS02-071 has been supersede by the patch released with MS04-032. See References.
Note: It has been reported on some systems this patch could cause the system to crash without warning. See References.
- BugTraq Mailing List, 2003-01-12 14:22:18: A patch for "Windows WM_TIMER Message Handling flaw" causes random crashes on Windows NT.
- CIAC Information Bulletin N-027: Flaw in Windows WM_TIMER Message Handling.
- getad.chat.ru: Security Advisory 10.06.2002.
- Microsoft Security Bulletin MS02-071: Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation (328310).
- Microsoft Security Bulletin MS04-011: Security Update for Microsoft Windows (835732).
- Microsoft Security Bulletin MS04-031: Vulnerability in NetDDE Could Allow Remote Code Execution (841533).
- Microsoft Security Bulletin MS04-032: Security Update for Microsoft Windows (840987).
- White paper: Next-Generation W32 exploits: fundamental API flaws: Exploiting design flaws in the Win32 API for privilege escalation..
- BID-5408: Microsoft Windows Window Message Subsystem Design Error Vulnerability
- BID-5927: Microsoft Windows NetDDE Privilege Escalation Vulnerability
- CVE-2002-1230: NetDDE Agent on Windows NT 4.0, 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code as LocalSystem via shatter style attack by sending a WM_COPYDATA message followed by a WM_TIMER message, as demonstrated by GetAd, aka Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation.
- OSVDB ID: 13416: Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
- Microsoft Windows 2000
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0 Terminal Server
- Microsoft Windows XP
Oct 06, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this