SMB: NetDDE Long Share Name Buffer Overflow

This signature detects attempts to exploit a known vulnerability against the share name resource in Windows Network Dynamic Data Exchange connections. All Microsoft Windows platforms that support NetDDE are vulnerable. Attackers can send a crafted NetDDE request to overflow a buffer in the Windows DDE service and execute arbitrary code.

Extended Description

Microsoft Windows NetDDE is affected by a remote buffer-overflow vulnerability because the application fails to properly verify the lengths of strings contained within unspecified network messages before copying them into finite buffers. Note that NetDDE is not activated by default on Windows computers. An attacker may leverage this issue to execute arbitrary code on an affected computer with SYSTEM privileges. In some circumstances, where NetDDE services have been installed but not started, local attackers might exploit this issue to gain elevated privileges because an unprivileged user may start the services. ** UPDATE: NGSSoftware has released a preliminary advisory for this issue, announcing that technical details will be withheld until January 19, 2005. ** UPDATE: Immunity Research has reported that a remote attacker may require authentication before exploiting this vulnerability. Further details of this report can be found in the referenced message "ms04-031 pre-auth ??".

Affected Products

Avaya s8100_media_servers,Microsoft windows_xp_media_center_edition

Short Name
SMB:NETDDE-SHARE-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
Buffer CVE-2004-0206 Long Name NetDDE Overflow Share bid:11372
Release Date
10/27/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

7.5

Found a potential security threat?