Thread-topic: [SA15821] Microsoft Windows Kernel APC Queue List Handling Privilege Escalation
ôÕÔ ÂÏÌÅÅ ËÒÁÔËÏ, ÞÅÍ × ÓÏÏÂÝÅÎÉÉ eEye
>
> TITLE:
> Microsoft Windows Kernel APC Queue List Handling Privilege Escalation
>
> SECUNIA ADVISORY ID:
> SA15821
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/15821/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> Privilege escalation
>
> WHERE:
> Local system
>
> OPERATING SYSTEM:
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
> Microsoft Windows 2000 Datacenter Server
> http://secunia.com/product/1177/
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
>
> DESCRIPTION:
> A vulnerability has been reported in Microsoft Windows, which can be
> exploited by malicious, local users to gain escalated privileges.
>
> The vulnerability is caused due to an error in the Kernel when
> processing items in the APC (Asynchronous Procedure Call) queue list.
> This can be exploited by logon users to gain escalated privileges by
> running a malicious program.
>
> Successful exploitation requires a valid logon to the affected
> system.
>
> SOLUTION:
> Apply patches.
>
> Microsoft Windows 2000 (requires SP 4):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=3832F
> F23-6B04-4CA2-80B9-D344B4CC98EA
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits eEye Digital Security.
>
> ORIGINAL ADVISORY:
> MS05-055 (KB908523):
> http://www.microsoft.com/technet/security/Bulletin/MS05-055.mspx
>
> ----------------------------------------------------------------------