1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Microsoft Security: Buffer Overrun in Windows Kernel Message Handling

Discussion in 'Security and Privacy' started by Arie, 2003/04/16.

Thread Status:
Not open for further replies.
  1. 2003/04/16
    Arie

    Arie Administrator Administrator Staff Thread Starter

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Microsoft has posted a patch for Microsoft Windows NT 4.0, Windows 2000 and Windows XP. A flaw exists in the Windows kernel, the core of the operating system. There is a flaw in the way the kernel passes error messages to a debugger. An attacker could exploit this flaw to take any action on the system including deleting data, adding accounts with administrative access, or reconfiguring the system.


    Affected Software Versions

    • Microsoft Windows NT 4.0 and Windows NT 4.0 Server, Terminal Server Edition
    • Microsoft Windows 2000
    • Microsoft Windows XP

    Severity Rating: Important


    More...
     
    Arie,
    #1
  2. 2003/04/24
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Microsoft added the following to the Security Bulletin:


     

  3. to hide this advert.

  4. 2003/05/29
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    On May 28, 2003, Microsoft advised its customers on the availability of an updated Windows XP Service Pack 1 "811493" patch. This revised patch corrects the performance issues that some customers experienced with the original Windows XP Service Pack 1 patch.

    Find download locations
     
  5. 2003/05/29
    BOBBO

    BOBBO Geek Member

    Joined:
    2002/01/07
    Messages:
    1,892
    Likes Received:
    19
    Part of the announcement says:

    "For an attack to be successful, an attacker would need to be able to logon interactively to the system, either at the console or through a terminal session. Also, a successful attack would require the introduction of code in order to exploit this vulnerability. Because best practices recommends restricting the ability to logon interactively on servers, this issue most directly affects client systems and terminal servers. "

    I'm not as clear as I'd like to be on whether or not that applies to users who have a stand-alone system in their home, like I do, and are the only person who ever uses that system.

    So, given the above, my question is: should I download that patch or not?
     
  6. 2003/05/29
    charlesvar

    charlesvar Inactive Alumni

    Joined:
    2002/02/18
    Messages:
    7,024
    Likes Received:
    0
    Hello BOBBO,

    I'm glad somebody is asking this question instead of blindly installing MS patches.

    I asked myself the same question; my answer is no.

    For those that feel unsure or feel that they don't know enough,
    at least wait some some time to see if the patches themselves don't create problems. If they do, that will be reported.

    Regards - Charles
     
  7. 2003/05/30
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    I myself wrote an article at the time: Microsoft Kernel Patch Slowing Down Windows XP Systems and concluded:

    There's still no need for most users to install this patch, and I would argue that MS shouldn't list it as a critical update on the Windows Update site (they are not listing it as such on their security bulletin, so why would they list it critical on their update site?)
     
  8. 2003/05/30
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Probably to avoid any chance of being accused of not taking security seriously. They will undoubtedly receive support calls in two months from customers who have been exploited.
     
  9. 2003/05/30
    BOBBO

    BOBBO Geek Member

    Joined:
    2002/01/07
    Messages:
    1,892
    Likes Received:
    19
    charlesvar and Arie: Thanks for your replies. My question is answered and I won't be downloading the patch. Thanks again.
     
  10. 2003/05/30
    KenKeith

    KenKeith Inactive

    Joined:
    2002/01/09
    Messages:
    305
    Likes Received:
    0
    Arie,
    Any details for do not install.
    With automatic update set MS does a scan of a user's system and compares stored info of user's configuration and previous installs and responds accordingly.

    I have XP (home version) and MS recognized my system needed the re-release update installed. It has been installed without any problems, and as you have pointed out full disclosure of what the specifics are other than what you have cited and read may not be the entire picture.

    If it does present a problem, MS made a colossal mistake and will have to re-write. Or recommend deletion and installation of the first release for the users who received the update automatically. Could MS be that incompetent?
     
  11. 2003/05/30
    charlesvar

    charlesvar Inactive Alumni

    Joined:
    2002/02/18
    Messages:
    7,024
    Likes Received:
    0
    Hi KenKeith,

    "Could MS be that incompetent?" Not more or less incompetent than any other company, but far more pervasive. To borrow a pharse, when Bill Gates sneezes, the rest of us catch cold.

    Regards - Charles
     
  12. 2003/05/30
    KenKeith

    KenKeith Inactive

    Joined:
    2002/01/09
    Messages:
    305
    Likes Received:
    0
    Home versions of XP cannot be ruled out. The deciding factor is whether one is the sole user or all users are computer administration notwithstanding version. Just have the capabilities, user designation, and the configuration.

    The problem is the possibility of an interaction of 3 identified programs installed on SP1 that could lead to unathorized elevation of privileges. MS admonishes, " RECOMMEND INSTALLING THE CORRECT VERSION OF THE SECURITY UPDATE AS SOON AS POSSIBLE. IF YOU CAN NOT UPDATE IMMEDIATELY IT IS RECOMMENDED TO TEMPORARILY REMOVE THE ORIGINAL PATCH. ":p Wouldn't elevated privileges enable a hacker easier access and enhanced navigating capabilities??

    Additionally, it is noted that due to some routines in the SP1, the installation of the May patch may enhance performance. I have experienced a faster performance with the May patch and addresses may long standing complaint of a somewhat sluggish perfomance after installing SP1. Several other users have had identical results.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.