Vulnerability Note VU#107280

Microsoft Windows 2000 Network Dynamic Data Exchange (DDE) executes code as Local System

Original Release date: 13 Jul 2002 | Last revised: 13 Jul 2002


The Windows 2000 Network DDE agent permits local users to execute commands with system privileges.


Dynamic Data Exchange (DDE) is an interprocess communication mechanism used in Microsoft Windows. A DDE share is an area of memory which is used to store and retrieve data. Network DDE is used between process on two different computers that wish to communicate using DDE. The service that manages this network communication is called the Network DDE Agent. When a share is marked by its creator as a truted share, it can be used by the Network DDE Agent.

When a trusted share is accessed by a local user, part of the request can include an application that will be invoked by the Network DDE Agent. Under Windows 2000, this application will run with Local System privileges. Since any local user can created trusted shares, it is possible for an intruder who already has access to the system to leverage this vulnerability to execute an arbitrary program with Local System privileges. For more information, see Microsoft Security Bulletin MS01-007. Additionally, see the bulletin provided by @Stake on this issue.


Local users can execute arbitrary commands with system privileges.


Apply a patch as described in MS01-007.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected05 Feb 200113 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Microsoft and @Stake for the information provided in their bulletins.

This document was written by Shawn V Hernan based on information provided by Microsoft and @Stake.

Other Information

  • CVE IDs: CAN-2001-0015
  • Date Public: 05 Feb 2001
  • Date First Published: 13 Jul 2002
  • Date Last Updated: 13 Jul 2002
  • Severity Metric: 25.73
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.