CERT-In Vulnerability Note
CIVN-2013-0217
Microsoft Local Remote Procedure Call Privilege Elevation Vulnerability
Original Issue Date:December 11, 2013
Severity Rating: MEDIUM
Systems Affected
- Windows XP SP 3
- Windows XP Professional x64 Edition SP 2
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 with SP2 for Itanium-based Systems
Overview
A vulnerability has been reported in Microsoft Local Remote Procedure Call (LRPC) service which could allow an attacker to execute arbitrary code with elevated privileges.
Description
This vulnerability exists in Microsoft Local Remote Procedure Call (LRPC) service due a stack-based buffer overflow during the exchange of port messages between any LPC client and LPC server. A local attacker could exploit this vulnerability by logging on locally with valid credentials and running a specially crafted LRPC server that sends a specially crafted LPC port message to the LRPC client.
Successful exploitation could allow the attacker to execute arbitrary code on the system with elevated privileges, possibly resulting in a complete system compromise.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS13-102
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms13-102
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms13-102
Secunia
http://secunia.com/advisories/55988/
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=31976
CVE Name
CVE-2013-3878
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|