A vulnerability in the Network Dynamic Data Exchange service for Microsoft Windows could allow an attacker to compromise the affected system.
Microsoft's Network Dynamic Data Exchange (NetDDE) is a communication protocol that allows two Windows applications to communicate with each other over a network. A buffer management flaw exists in the way that this service handles certain malformed messages. This flaw results in a vulnerability that could allow an attacker to compromise the system. According to Microsoft security bulletin MS04-031:
A remote code execution vulnerability exists in the NetDDE services because of an unchecked buffer. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, the NetDDE services are not started by default and would have to be manually started for an attacker to attempt to remotely exploit this vulnerability.
A remote unauthenticated attacker may be able to execute arbitrary code with administrative privileges on the affected system. Microsoft reports that this vulnerability could also be used to attempt to perform a local elevation of privilege or remote denial of service.
Apply a patch from the vendor
Thanks to John Heasman of Next Generation Security Software Ltd for reporting this vulnerability.
This document was written by Chad R Dougherty based on information provided by Microsoft.
|Date First Published:||2004-10-13|
|Date Last Updated:||2005-01-24 20:01 UTC|