The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS01-059: Unchecked Buffer in Universal Plug and Play can Lead to System Compromise
Time: 18:00 EST/23:00 GMT | News Source: ActiveWin.com | Posted By: Matthew Sabean

The Universal Plug and Play (UPnP) service allows computers to discover and use network-based devices. Windows ME and XP include native UPnP services; Windows 98 and 98SE do not include a native UPnP service, but one can be installed via the Internet Connection Sharing client that ships with Windows XP. This bulletin discusses two vulnerabilities affecting these UPnP implementations. Although the vulnerabilities are unrelated, both involve how UPnP-capable computers handle the discovery of new devices on the network.

The first vulnerability is a buffer overrun vulnerability. There is an unchecked buffer in one of the components that handle NOTIFY directives – messages that advertise the availability of UPnP-capable devices on the network. By sending a specially malformed NOTIFY directive, it would be possible for an attacker to cause code to run in the context of the UPnP service, which runs with System privileges on Windows XP. (On Windows 98 and Windows ME, all code executes as part of the operating system). This would enable the attacker to gain complete control over the system.

The second vulnerability results because the UPnP doesn’t sufficiently limit the steps to which the UPnP service will go to obtain information on using a newly discovered device. Within the NOTIFY directive that a new UPnP device sends is information telling interested computers where to obtain its device description, which lists the services the device offers and instructions for using them. By design, the device description may reside on a third-party server rather than on the device itself. However, the UPnP implementations don’t adequately regulate how it performs this operation, and this gives rise to two different denial of service scenarios.

Patch availability:

Write Comment
Return to News

  Displaying 701 through 702 of 702
Prev | First
  The time now is 2:40:09 PM ET.
Any comment problems? E-mail us
#701 By 4240821 (82.115.4.230) at 11/20/2025 6:11:25 PM
https://sluts.su/activg3f1fbfhbg
https://nsfw.su/activce2h235bb2
https://sexonly.su/activhf1ccgbd14
https://lustful.su/activf4d34eghcc
https://sexonly.top/activ1d3h44b2h1
https://lustful.su/activ2h5h3abdf5
https://lustful.su/activ5b4dbea52f
https://nsfw.su/activee45ad1bde
https://nsfw.su/activef2ab442a3
https://sexonly.top/activccccdhehgg

#702 By 4240821 (82.115.4.230) at 11/21/2025 8:21:02 AM
https://sexonly.top/activh5g2df1eag
https://smutty.su/activah21faebhh
https://lustful.su/activbddbche43e
https://sexonly.su/activad2ah1d353
https://nsfw.su/activ5dbf2hd3d4
https://smutty.su/activ3g13gd1fh1
https://nsfw.su/activa3g1g331a3
https://sluts.su/activ2gb3h3c4eh
https://smutty.su/activeh14ggh5gd
https://lustful.su/activ54de3c3f55

Write Comment
Return to News
  Displaying 701 through 702 of 702
Prev | First
  The time now is 2:40:09 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *