Executive Summary

Summary
Title Exploit Code Published Affecting the Server Service
Informations
Name KB922437 First vendor Publication 2006-08-11
Vendor Microsoft Last vendor Modification 2006-08-13
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft is aware of public reports regarding an attack known as Win32/Graweg exploiting the vulnerability addressed by security update MS06-040. Microsoft’s initial investigation of Win32/Graweg verified that it only affects users running Windows 2000 that have not applied the update detailed in MS06-040. Microsoft has activated its emergency response process and is continuing to investigate this issue.

The Microsoft Security Response Alliance partners as well as our own internal teams have determined that there is not widespread customer impact and have rated Win32/Graweg as a Low threat. At this time it does not appear to be a self-replicating internet-wide worm.

Microsoft continues to recommend that customers apply the August updates as soon as possible with additional urgency and consideration given to the update detailed in MS06-040. Customers can ensure that the updates are being installed by enabling the Automatic Updates feature in Windows or by using their deployment infrastructure in their enterprise or small business.

Customers who believe that they are infected or are not sure whether they are infected by Win32/Graweg should visit Safety.live.com and choose "Protection Scan." Additionally, Windows Live OneCare from Microsoft provides detection against Win32/Graweg and its known variants.

Customers who believe they have been attacked should contact their local FBI office or report their situation to www.ic3.gov. Customers outside the U.S. should contact the national law enforcement agency in their country

Customers who believe they are affected can contact Product Support Services. Contact Product Support Services in North America for help with security update issues or viruses at no charge using the PC Safety line (1866-PCSAFETY) and international customers by using any method found at this location: http://support.microsoft.com/security.


Mitigating Factors:

Customers who have installed the MS06-040 security update are not affected by this vulnerability.

While installation of the update is the recommended action, customers who have applied the mitigations as identified in MS06-040 will have minimized their exposure and potential exploitability against an attack.

What is the scope of the advisory?
Microsoft is aware of public posting of exploit code targeting the vulnerability identified in Microsoft Security Update MS06-040. This affects the software that is listed in the “Overview” section

Is this a security vulnerability that requires Microsoft to issue a security update?
No. Customers who have installed the MS06-040 security update are not affected by this vulnerability. No additional update is required.

What causes the vulnerability?
An unchecked buffer in the Server service.

How could an attacker exploit the vulnerability?
An attacker could try to exploit the vulnerability by creating a specially crafted message and sending the message to an affected system. The message could then cause the affected system to execute code.

What is the Server service?
The Server service provides RPC support, file print support and named pipe sharing over the network. The Server service allows the sharing of your local resources (such as disks and printers) so that other users on the network can access them. It also allows named pipe communication between applications running on other computers and your computer, which is used for RPC.

What might an attacker use this function to do?
An attacker who successfully exploited this vulnerability could take complete control of the affected system.

Are there any known issues with installing Microsoft Security Update MS06-040 that protects against this threat?
No. Microsoft continues to encourage customers to install the update immediately.

Original Source

Url : http://www.microsoft.com/technet/security/advisory/922437.mspx

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-04-26 17:51:59
  • Multiple Updates
2013-05-11 12:20:21
  • Multiple Updates