{"vuid":"VU#107280","idnumber":"107280","name":"Microsoft Windows 2000 Network Dynamic Data Exchange (DDE) executes code as Local System","keywords":["Microsoft","Windows 2000","DDE","MS01-007","WINLOGON","NetDDE","WM_COPYDATA","shatter"],"overview":"The Windows 2000 Network DDE agent permits local users to execute commands with system privileges.","clean_desc":"Dynamic Data Exchange (DDE) is an interprocess communication mechanism used in Microsoft Windows. A DDE share is an area of memory which is used to store and retrieve data. Network DDE is used between process on two different computers that wish to communicate using DDE. The service that manages this network communication is called the Network DDE Agent. When a share is marked by its creator as a truted share, it can be used by the Network DDE Agent. When a trusted share is accessed by a local user, part of the request can include an application that will be invoked by the Network DDE Agent. Under Windows 2000, this application will run with Local System privileges. Since any local user can created trusted shares, it is possible for an intruder who already has access to the system to leverage this vulnerability to execute an arbitrary program with Local System privileges. For more information, see Microsoft Security Bulletin MS01-007. Additionally, see the bulletin provided by @Stake on this issue.","impact":"Local users can execute arbitrary commands with system privileges.","resolution":"Apply a patch as described in MS01-007.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft and @Stake for the information provided in their bulletins.","author":"This document was written by Shawn V Hernan based on information provided by Microsoft and @Stake.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-007.asp","http://www.microsoft.com/technet/security/bulletin/fq01-007.asp","http://www.atstake.com/research/advisories/2001/a020501-1.txt","http://www.securityfocus.com/bid/2341","http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ipc/netdde_3mcl.asp"],"cveids":["CVE-2001-0015"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-02-05T23:01:46Z","publicdate":"2001-02-05T00:00:00Z","datefirstpublished":"2002-07-13T23:58:53Z","dateupdated":"2002-07-13T23:59:58Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"14","cam_impact":"20","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"25.725","cam_scorecurrentwidelyknown":"25.725","cam_scorecurrentwidelyknownexploited":"33.075","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.725,"vulnote":null}