{"vuid":"VU#446338","idnumber":"446338","name":"Microsoft Windows kernel contains stack overflow","keywords":["Entercept","Microsoft","kernel","debug","buffer overflow"],"overview":"A stack overflow vulnerability exists in the Microsoft Windows kernel.","clean_desc":"The kernel is the core or \"heart\" of any operating system and is responsible for a variety of things, such as managing memory and allocating hardware resources. Entercept's Ricochet Team has discovered a stack buffer overflow in the Microsoft Windows kernel (ntoskrnl.exe). This vulnerability is present in Windows NT 4.0, Windows 2000, and Windows XP. The overflow exists in the portion of the kernel responsible for handling debugging. Specifically, LpcRequestWaitReplyPort(), which is called from the kernel, inappropriately trusts a user space process to correctly report the size of a message passed back to the kernel. By exploiting this vulnerability, an attacker may be able to execute code with the privileges of the operating system kernel. For further technical details, please see the following documents: Microsoft Security Bulletin MS03-013\nEntercept Security Alert","impact":"Exploitation of this vulnerability may allow an attacker to execute code in the context of the kernel. As a result, an attacker could do anything the kernel is capable of doing, such as reading protected areas of system memory, writing to disk, and communicating with the network.","resolution":"Apply a patch when one becomes available.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Oded Horovitz of \nEntercept Security Technologies\n. The CERT/CC thanks both Entercept Security Technologies and Microsoft \nfor providing information that served as a basis for this document.","author":"This document was written by Ian A Finlay.","public":["http://www.entercept.com/news/uspr/04-16-03.asp","http://microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-013.asp"],"cveids":["CVE-2003-0112"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-11-22T20:39:41Z","publicdate":"2003-04-16T00:00:00Z","datefirstpublished":"2003-04-15T20:13:56Z","dateupdated":"2003-04-16T17:57:21Z","revision":36,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.125","cam_scorecurrentwidelyknown":"12.9375","cam_scorecurrentwidelyknownexploited":"24.1875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.125,"vulnote":null}