Vulnerability Note VU#721611
Microsoft Windows Network Connection Manager (NCM) handler routine may execute code with LocalSystem privileges
A locally exploitable vulnerability exists in the Microsoft Windows 2000 Network Connection Manager (NCM). Exploitation of this vulnerability may permit a local user to gain full privileges on the system.
Microsoft Windows 2000 Network Connection Manager (NCM) provides routines to control all network connections managed by the system, such as dial-up and local area network connections. A vulnerability exists in the privileges applied to the NCM configuration that runs a handler when a network connection has been established. This handler routine should run in the security context of the user. However, an unprivileged local user can configure what handler routine is used by the NCM when a new network connection is established and cause the handler routine to run in the security context of the "LocalSystem." The NCM would then execute the attacker's code with full system privileges when the attacker establishes a connection.
A local user may be able to execute arbitrary code with full system privileges.
Apply the patch provided in Microsoft's Security Bulletin (MS02-042). Note that according to the Microsoft Bulletin, only Windows XP, Windows 2000, and Windows NT 4.0 were tested to assess whether they are affected by these vulnerabilities. Previous versions may or may not be affected by these vulnerabilities.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||16 Aug 2002|
CVSS Metrics (Learn More)
This vulnerability was announced in a Microsoft Security Bulletin.
This document was written by Jason A Rafail and is based on information from Microsoft Security Bulletin (MS02-042).
- CVE IDs: CAN-2002-0720
- Date Public: 14 Aug 2002
- Date First Published: 16 Aug 2002
- Date Last Updated: 22 Aug 2002
- Severity Metric: 11.25
- Document Revision: 11
If you have feedback, comments, or additional information about this vulnerability, please send us email.