Microsoft Windows UNC Path Handling Unspecified Buffer Overflow Vulnerability

Microsoft Windows is reported prone to an unspecified buffer overflow vulnerability when handling a malformed UNC path.

It is reported that this issue can be triggered by supplying a malformed UNC path through the command line. Further details were not disclosed, however, it is conjectured that a local attacker supplies excessive data as a UNC path to trigger the overflow condition leading to memory corruption. It is currently not known if this will allow a local attacker to gain elevated privileges.

Although unconfirmed, this issue may also pose a remote risk if an attacker is able to supply a vulnerable user with a malformed UNC path and entice them to open it or through an application that processes UNC paths.

This issue has reportedly been addressed with the release of Windows Server 2003 SP1. Operating system releases prior to Server 2003 are also reportedly affected.

Due to a lack of details, further information is not available at the moment. This BID will be updated when more details are released.


 

Privacy Statement
Copyright 2010, SecurityFocus