The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS03-024: Buffer Overrun in Windows Could Lead to Data Corruption (Q817606)
Time: 19:03 EST/00:03 GMT | News Source: ActiveWin.com | Posted By: Todd Richardson

A flaw exists in the way that the server validates the parameters of an SMB packet. When a client system sends an SMB packet to the server system, it includes specific parameters that provide the server with a set of "instructions." In this case, the server is not properly validating the buffer length established by the packet. If the client specifies a buffer length that is less than what is needed, it can cause the buffer to be overrun.

By sending a specially crafted SMB packet request, an attacker could cause a buffer overrun to occur. If exploited, this could lead to data corruption, system failure, or-in the worst case- it could allow an attacker to run the code of their choice. An attacker would need a valid user account and would need to be authenticated by the server to exploit this flaw.

Write Comment
Return to News

  Displaying 776 through 776 of 776
Prev | First
  The time now is 7:31:55 PM ET.
Any comment problems? E-mail us
#776 By 4240821 (82.115.4.100) at 1/9/2026 3:07:49 PM
https://www.pillowfort.social/posts/6923262
https://www.pillowfort.social/posts/6923199
https://www.pillowfort.social/posts/6923133
https://www.pillowfort.social/posts/6923101
https://www.pillowfort.social/posts/6923075
https://www.pillowfort.social/posts/6922964
https://www.pillowfort.social/posts/6922909
https://www.pillowfort.social/posts/6922873
https://www.pillowfort.social/posts/6922749
https://www.pillowfort.social/posts/6922637

Write Comment
Return to News
  Displaying 776 through 776 of 776
Prev | First
  The time now is 7:31:55 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *