The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS01-059: Unchecked Buffer in Universal Plug and Play can Lead to System Compromise
Time: 18:00 EST/23:00 GMT | News Source: ActiveWin.com | Posted By: Matthew Sabean

The Universal Plug and Play (UPnP) service allows computers to discover and use network-based devices. Windows ME and XP include native UPnP services; Windows 98 and 98SE do not include a native UPnP service, but one can be installed via the Internet Connection Sharing client that ships with Windows XP. This bulletin discusses two vulnerabilities affecting these UPnP implementations. Although the vulnerabilities are unrelated, both involve how UPnP-capable computers handle the discovery of new devices on the network.

The first vulnerability is a buffer overrun vulnerability. There is an unchecked buffer in one of the components that handle NOTIFY directives – messages that advertise the availability of UPnP-capable devices on the network. By sending a specially malformed NOTIFY directive, it would be possible for an attacker to cause code to run in the context of the UPnP service, which runs with System privileges on Windows XP. (On Windows 98 and Windows ME, all code executes as part of the operating system). This would enable the attacker to gain complete control over the system.

The second vulnerability results because the UPnP doesn’t sufficiently limit the steps to which the UPnP service will go to obtain information on using a newly discovered device. Within the NOTIFY directive that a new UPnP device sends is information telling interested computers where to obtain its device description, which lists the services the device offers and instructions for using them. By design, the device description may reside on a third-party server rather than on the device itself. However, the UPnP implementations don’t adequately regulate how it performs this operation, and this gives rise to two different denial of service scenarios.

Patch availability:

Write Comment
Return to News

  Displaying 676 through 678 of 678
Prev | First
  The time now is 8:28:24 PM ET.
Any comment problems? E-mail us
#676 By 4240821 (82.115.4.230) at 11/9/2025 5:55:37 PM
https://sluts.su/activ3aa5h1ca13
https://sluts.su/activ32ddcde3e1
https://smutty.su/activccfa1dbb53
https://nsfw.su/activcg25ebg5h5
https://sexonly.su/activfdb32b44f2
https://lustful.su/activ2agg41h5de
https://nsfw.su/activgaa31e5e5a
https://smutty.su/activ3fdec4bhdh
https://lustful.su/actived2dab5cb2
https://smutty.su/activgg1cffcdcf

#677 By 4240821 (82.115.4.230) at 11/10/2025 2:31:52 AM
https://sexonly.top/activcdaahhdg5a
https://nsfw.su/activ3addabh15a
https://lustful.su/activch1fg3b1f2
https://lustful.su/activeeha5fghea
https://smutty.su/activb2cgg5ea5e
https://sluts.su/activ334dh1hhg2
https://nsfw.su/activfhac2gfdd1
https://smutty.su/activhae45gec5h
https://sexonly.su/activgb1b5hfdge
https://sluts.su/activ45ah1g2a35

#678 By 4240821 (45.192.45.37) at 11/10/2025 5:33:03 PM
https://www.pillowfort.social/posts/6844189
https://www.pillowfort.social/posts/6843999
https://www.pillowfort.social/posts/6843879
https://www.pillowfort.social/posts/6843572
https://www.pillowfort.social/posts/6843380
https://www.pillowfort.social/posts/6843232
https://www.pillowfort.social/posts/6843117
https://www.pillowfort.social/posts/6842989
https://www.pillowfort.social/posts/6842846
https://www.pillowfort.social/posts/6842765

Write Comment
Return to News
  Displaying 676 through 678 of 678
Prev | First
  The time now is 8:28:24 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *