Thread-topic: [SA24822] Microsoft Windows XP UPnP Memory Corruption Vulnerability
> ----------------------------------------------------------------------
>
> TITLE:
> Microsoft Windows XP UPnP Memory Corruption Vulnerability
>
> SECUNIA ADVISORY ID:
> SA24822
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/24822/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> System access
>
> WHERE:
> From local network
>
> OPERATING SYSTEM:
> Microsoft Windows XP Home Edition
> http://secunia.com/product/16/
> Microsoft Windows XP Professional
> http://secunia.com/product/22/
>
> DESCRIPTION:
> A vulnerability has been reported in Microsoft Windows, which can be
> exploited by malicious people to compromise a vulnerable system.
>
> The vulnerability is caused due to an error in the UPnP (Universal
> Plug and Play) service when processing HTTP requests. This can be
> exploited to corrupt memory via a specially crafted HTTP request sent
> to the service.
>
> Successful exploitation allows execution of arbitrary code with
> "Local Service" privileges.
>
> SOLUTION:
> Apply patches.
>
> Windows XP (requires SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=ecf69
> 778-91f9-498e-a8bd-35208aa93051
>
> Windows XP Professional x64 Edition (optionally with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=6ceb5
> b4f-861f-4f37-b4bc-e8a56382b833
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Greg MacManus, iDefense Labs.
>
> ORIGINAL ADVISORY:
> MS07-019 (KB931261):
> http://www.microsoft.com/technet/security/Bulletin/MS07-019.mspx
>