Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run
Originally posted: February 12, 2002 Updated: March 5, 2002
Summary
Who should read this bulletin: System administrators who use Simple Network Management Protocol to manage Microsoft® Windows® 95, 98, 98SE, Windows NT® 4.0, Windows 2000 or Windows XP systems. Impact of vulnerability: Denial of Service, potentially run code of attacker's choice.
Maximum Severity Rating: Moderate
Recommendation: Customers using SNMP on Windows 2000 and Windows XP should apply the patch. All other customers should disable SNMP service if running; apply patch when available
Affected Software:
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows 98SE
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Server, Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
Vulnerability identifier: CAN-2002-0053
Tested Versions:
Microsoft tested Windows 95, Windows 98, Windows 98SE, Windows ME, Windows NT 4.0, Windows 2000, and Windows XP to assess whether they are affected by this vulnerability. Previous versions are no longer supported, and may or may not be affected by these vulnerabilities.
Patch availability
Download locations for this patch
Windows NT 4.0:
https://www.microsoft.com/downloads/release.asp?ReleaseID=36167
Windows 2000:
https://www.microsoft.com/downloads/release.asp?ReleaseID=36142
Windows XP:
https://www.microsoft.com/downloads/release.asp?ReleaseID=36262
Patches for other platforms are under development and will be available shortly. When this happens, we will re-release this bulletin with information on how to obtain and install these patches.
News source: Microsoft Security Email