search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Web Client Service vulnerable to buffer overflow

Vulnerability Note VU#388900

Original Release Date: 2006-02-14 | Last Revised: 2006-02-14

Overview

A buffer overflow in the message handling routines of the Microsoft Web Client Service may allow a remote, authenticated attacker to execute arbitrary code on a vulnerable system.

Description

According to Microsoft, the Web Client Service:

allows applications to access documents on the Internet. Web Client extends the networking capability of Windows by allowing standard Win32 applications to create, read, and write files on Internet file servers by using the WebDAV protocol. The WebDAV protocol is a file-access protocol that is described in XML and that travels over the Hypertext Transfer Protocol (HTTP). By using standard HTTP, WebDAV runs over the existing Internet infrastructure. For example, WebDAV runs over firewalls and routers.
The Web Client Service (WebClnt.dll) does not properly validate incoming messages, potentially allowing a buffer overflow to occur. If a remote, authenticated attacker sends a specially crafted message to a vulnerable system, they may be able to trigger the buffer overflow.

The Web Client Service is disabled by default on Windows Server 2003, but may be enabled by default in Microsoft Windows XP. For more information about affected components, please refer to MS06-008. This Bulletin supplants Microsoft Security Bulletin MS05-028.

Impact

A remote attacker with valid login credentials may be able to exploit this vulnerability to execute arbitrary code.

Solution

Apply An Update
Microsoft has addressed this issue in Microsoft Security Bulletin MS06-008

Please see Microsoft Security Bulletin MS06-009 for a list of workarounds to mitigate this vulnerability.

Vendor Information

388900
 
Affected   Unknown   Unaffected

Microsoft Corporation

Updated:  February 14, 2006

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://www.microsoft.com/technet/security/Bulletin/MS06-008.mspx.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was reported in Microsoft Security Bulletin MS06-008 . Microsoft credits Kostya Kortchinsky of EADS/CRC with providing information regarding this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0013
Severity Metric: 5.68
Date Public: 2006-02-14
Date First Published: 2006-02-14
Date Last Updated: 2006-02-14 21:37 UTC
Document Revision: 15

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.