MS01-059: Unchecked Buffer in Universal Plug and Play can Lead to System Compromise (315000)

critical Nessus Plugin ID 10835

Synopsis

The Universal Plug and Play service on the remote host is prone to denial of service and buffer overflow attacks.

Description

Using a specially crafted NOTIFY directive, a remote attacker can cause code to run in the context of the Universal Plug and Play (UPnP) subsystem or possibly launch a denial of service attack against the affected host.

Note that, under Windows XP, the UPnP subsystem operates with SYSTEM privileges.

Solution

Microsoft has released a set of patches for Windows 98, 98SE, ME, and XP.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2001/ms01-059

Plugin Details

Severity: Critical

ID: 10835

File Name: smb_xp_ms01-059.nasl

Version: 1.35

Type: local

Agent: windows

Published: 1/25/2002

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/20/2001

Vulnerability Publication Date: 12/20/2001

Reference Information

CVE: CVE-2001-0876, CVE-2001-0877

BID: 3723

MSFT: MS01-059

MSKB: 315000