Microsoft Windows MSDTC Heap Buffer Overflow Vulnerability

Microsoft Windows Distributed Transaction Coordinator is prone to a remote heap buffer-overflow vulnerability. This issue is due to the failure of the software to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This BID is flagged with the 'Conflicting Details' credibility rating because of the discrepancy between the vendor and the discoverer as to the possibility of remote code execution.

Microsoft states that this issue may be exploited only to disrupt the MSDTC service and any services that depend on MSDTC, but the discoverer of this issue states that it may be exploited for remote code execution.

This vulnerability affects Windows NT and Windows 2000 by default, since the service comes enabled. The vulnerability affects Windows XP and Windows Server 2003 only if the service is manually enabled.


Privacy Statement
Copyright 2010, SecurityFocus