---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Microsoft Windows Services for UNIX Privilege Escalation SECUNIA ADVISORY ID: SA26757 VERIFY ADVISORY: http://secunia.com/advisories/26757/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Storage Server 2003 http://secunia.com/product/12399/ Microsoft Windows Vista http://secunia.com/product/13223/ SOFTWARE: Microsoft Windows Services for UNIX 3.x http://secunia.com/product/5244/ DESCRIPTION: A vulnerability has been reported in Microsoft Windows Services for UNIX, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to an unspecified error in Windows Services for UNIX and the Subsystem for UNIX-based Applications component when handling connection credentials for setuid binaries. This can be exploited to execute arbitrary code with escalated privileges by running a specially crafted setuid binary. Successful exploitation requires that Windows Services for UNIX is installed or the Subsystem for UNIX-based Applications component is enabled (disabled by default). NOTE: According to Microsoft, "limited distribution" of the vulnerability details already exists. SOLUTION: Apply patches. Windows 2000 SP4 with Windows Services for UNIX 3.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277 Windows 2000 SP4 with Windows Services for UNIX 3.5: http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663 Windows XP SP2 with Windows Services for UNIX 3.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277 Windows XP SP2 with Windows Services for UNIX 3.5: http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663 Windows Server 2003 SP1/SP2 with Windows Services for UNIX 3.0: http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277 Windows Server 2003 SP1/SP2 with Windows Services for UNIX 3.5: http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663 Windows Server 2003 SP1/SP2 with Subsystem for UNIX-based Applications: http://www.microsoft.com/downloads/details.aspx?FamilyId=8ab5cc43-0b9c-45eb-aa51-47568ab6ce3f Windows Server 2003 x64 Edition (optionally with SP2) with Subsystem for UNIX-based Applications: http://www.microsoft.com/downloads/details.aspx?FamilyId=1d21e3e8-b5f6-4044-9db6-054af836492b Window Vista with Subsystem for UNIX-based Applications: http://www.microsoft.com/downloads/details.aspx?FamilyId=4d52e4f4-2888-42df-8163-85c648e65b29 Windows Vista x64 Edition with Subsystem for UNIX-based Applications: http://www.microsoft.com/downloads/details.aspx?FamilyId=4be667cc-c239-480b-a9a0-939bcd27f0de PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: MS07-053 (KB939778): http://www.microsoft.com/technet/security/Bulletin/MS07-053.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------