A locally exploitable vulnerability exists in the Microsoft Windows 2000 Network Connection Manager (NCM). Exploitation of this vulnerability may permit a local user to gain full privileges on the system.
Microsoft Windows 2000 Network Connection Manager (NCM) provides routines to control all network connections managed by the system, such as dial-up and local area network connections. A vulnerability exists in the privileges applied to the NCM configuration that runs a handler when a network connection has been established. This handler routine should run in the security context of the user. However, an unprivileged local user can configure what handler routine is used by the NCM when a new network connection is established and cause the handler routine to run in the security context of the "LocalSystem." The NCM would then execute the attacker's code with full system privileges when the attacker establishes a connection.
A local user may be able to execute arbitrary code with full system privileges.
Apply the patch provided in Microsoft's Security Bulletin (MS02-042). Note that according to the Microsoft Bulletin, only Windows XP, Windows 2000, and Windows NT 4.0 were tested to assess whether they are affected by these vulnerabilities. Previous versions may or may not be affected by these vulnerabilities.
This vulnerability was announced in a Microsoft Security Bulletin.
This document was written by Jason A Rafail and is based on information from Microsoft Security Bulletin (MS02-042).
|Date First Published:||2002-08-16|
|Date Last Updated:||2002-08-22 18:56 UTC|