CERT-In Vulnerability Note
CIVN-2010-0234
Microsoft Windows Local Procedure Call Privilege Elevation vulnerability
Original Issue Date:October 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
Overview
A privilege elevation vulnerability has been reported in the Microsoft Windows Remote Procedure Call Subsystem (RPCSS). Successful exploitation of this issue could allow an authenticated user to access resources running in the context of the NetworkService account.
Description
Local Procedure Call (LPC) is a message-passing service included in Windows. This service allows threads and processes to communicate with each other. Remote Procedure Call (RPC) is an inter-process communication (IPC) mechanism that enables data exchange and invocation of functionality residing in a different process. That process can be on the same computer, on the local area network (LAN), or across the Internet. Local RPC (LRPC) denotes RPC communication that takes place on a local system.
This vulnerability is caused due to a stack-based buffer overflow in the exchange of port messages between LPC and the LRPC Server (RPC EndPoint Mapper) contained within Remote Procedure Call Subsystem (RPCSS). A local application can use LPC to request the LPC server to connect back to the client using LRPC. This request could contain specially crafted data designed to cause a stack-based buffer overflow, allowing an authenticated user to access resources running in the context of the NetworkService account, i.e. priviledge elevation. Successful exploitation of this vulnerability could allow an authenticated attacker to execute code in the context of the NetworkService account. Some of these processes may have the ability to elevate their privileges to LocalSystem, allowing any NetworkService processes to elevate their privileges to LocalSystem as well. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Solution
Apply patches as mentioned in Microsoft Security bulletin
MS10-084
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-084.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-084.mspx
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=21512
SecurityFocus
http://www.securityfocus.com/bid/43777
Secunia
http://secunia.com/advisories/41700/
ISC SANS DIARY
http://isc.sans.edu/diary.html?storyid=9736
VUPEN
http://www.vupen.com/english/advisories/2010/2631
CVE Name
CVE-2010-3222
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|