Escalada de privilegios en LSASS y el kernel de Windows
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Aumento de privilegios |
Dificulty |
Principiante |
Required attacker level |
Acceso remoto con cuenta |
System information
|
Property |
Value |
Affected manufacturer |
Microsoft |
Affected software |
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Server, Terminal Server Edition
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional |
Description
|
Se han descubierto dos vulnerabilidades que afectan a los sistemas Windows:
CAN-2004-0893 - La interfaz de Local Procedure Call (LPC) del kernel de Windows NT 4.0, Windows 2000, Windows XP y Windows Server 2003 no valida correctamente la longitud de los mensajes enviados al puerto LPC, lo cual podría permitir a un usuario local escalar privilegios.
CAN-2004-0894 - LSASS (Local Security Authority Subsystem Service) para Windows 2000 Server y Windows Server 2003 no valida la información de las conexiones, lo que podría permitir a un usuario local escalar privilegios. |
Solution
|
Actualización de software
Microsoft Windows
Microsoft Windows NT Server 4.0 Service Pack 6a
http://www.microsoft.com/downloads/details.aspx?displaylang=es&FamilyID=325eaa8f-af09-4839-b9e8-bb218c7a8564
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
http://www.microsoft.com/downloads/details.aspx?displaylang=es&FamilyID=9823a61f-c69f-403a-bd6a-ef3984bfa2b8
Microsoft Windows 2000 Service Pack 3 & Microsoft Windows 2000 Service Pack 4
http://www.microsoft.com/downloads/details.aspx?displaylang=es&FamilyID=efdea122-dda4-40b8-a7af-9ddcc3870c38
Microsoft Windows XP Service Pack 1 & Microsoft Windows XP Service Pack 2
http://www.microsoft.com/downloads/details.aspx?displaylang=es&FamilyID=27115d5c-3e4a-4f41-b81e-376aa1cd204f
Microsoft Windows XP 64-Bit Edition Service Pack 1 (Inglés)
http://www.microsoft.com/downloads/details.aspx?familyid=1649AE1E-0ABF-4D31-BE12-3982C5146AE8&displaylang=en
Microsoft Windows XP 64-Bit Edition Version 2003 (Inglés)
http://www.microsoft.com/downloads/details.aspx?familyid=95849AB9-36BF-4A90-BC37-3B4FB6DCDF9A&displaylang=en
Microsoft Windows Server 2003
http://www.microsoft.com/downloads/details.aspx?displaylang=es&FamilyID=aacb97cb-e8f0-461f-b2d2-f1065229b64e
Microsoft Windows Server 2003 64-Bit Edition (Inglés)
http://www.microsoft.com/downloads/details.aspx?familyid=95849AB9-36BF-4A90-BC37-3B4FB6DCDF9A&displaylang=en |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0893
CAN-2004-0894 |
BID |
NULL |
Other resources
|
Microsoft Security Bulletin MS04-044 (885835)
http://www.microsoft.com/technet/security/bulletin/ms04-044.mspx |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2004-12-15
|
2.0
|
Exploit público disponible
|
2005-01-11
|