P
phil
i keep getting an error message that pops up in the
background that closes everything i am doing somethiing
has gotten into windows messenger service causeing the
popup on me then it says theres a cure for it and ask me
to go to this site http://www.windows-patch.info/ which i
belive its a fake microsoft site the patch links on the
site ask for money so if anyone knows what this problem
is can you e-mail me
Windows®Patch.info
This Security Fix is compatible with the following
Microsoft® Windows® Systems:
Microsoft Windows XP
Microsoft Windows NT Workstation
Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Security Bulletin MS03-043
Buffer Overrun in Messenger Service Could Allow Code
Execution (828035)
Issued: October 22, 2003
Version Number: 1.1
Summary
Who Should Read This Document: Customers using Microsoft®
Windows®
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Recommendation: Microsoft® Windows® should install a
patch immediately
Caveats: None
Tested Software and Patch Download Locations:
Affected Software:
Microsoft Windows NT Workstation - Download a fix to
patch this issue
Microsoft Windows NT - Download a fix to patch this issue
Microsoft Windows 2000 - Download a fix to patch this
issue
Microsoft Windows XP - Download a fix to patch this
issue
Microsoft Windows Win98 - Download a fix to patch this
issue
Microsoft Windows Server 2003 - Download a fix to patch
this issue
Non Affected Software:
Microsoft Windows Millennium Edition
The software listed above has been tested to determine if
the versions are affected. Other versions are no longer
supported, and may or may not be affected.
Technical Description:
A security vulnerability exists in the Microsoft®
Messenger Service that could allow arbitrary code
execution on an affected system. The vulnerability
results because the Messenger Service does not properly
validate the length of a message before passing it to the
allocated buffer.
An attacker who successfully exploited this vulnerability
could be able to run code with Local System privileges on
an affected system, or could cause the Messenger Service
to fail. The attacker could then take any action on the
system, including installing programs, viewing, changing
or deleting data, or creating new accounts with full
privileges.
Mitigating factors:
Messages are delivered to the Messenger service via
NetBIOS or RPC. If users have blocked the NetBIOS ports
(ports 137-139) - and UDP broadcast packets using a
firewall, others will not be able to send messages to
them on those ports. Most firewalls, including Internet
Connection Firewall in Windows XP, block NetBIOS by
default.
Disabling the Messenger Service will prevent the
possibility of attack.
On Windows Server 2003 systems, the Messenger Service is
disabled by default.
Severity Rating:
Windows NT Critical
Windows Server NT 4.0 Terminal Server Edition Critical
Windows 2000 Critical
Windows XP Critical
Windows Server 2003 Moderate
The above assessment is based on the types of systems
affected by the vulnerability, their typical deployment
patterns, and the effect that exploiting the
vulnerability would have on them.
background that closes everything i am doing somethiing
has gotten into windows messenger service causeing the
popup on me then it says theres a cure for it and ask me
to go to this site http://www.windows-patch.info/ which i
belive its a fake microsoft site the patch links on the
site ask for money so if anyone knows what this problem
is can you e-mail me
Windows®Patch.info
This Security Fix is compatible with the following
Microsoft® Windows® Systems:
Microsoft Windows XP
Microsoft Windows NT Workstation
Microsoft Windows NT
Microsoft Windows 2000
Microsoft Windows Server 2003
Microsoft Security Bulletin MS03-043
Buffer Overrun in Messenger Service Could Allow Code
Execution (828035)
Issued: October 22, 2003
Version Number: 1.1
Summary
Who Should Read This Document: Customers using Microsoft®
Windows®
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Recommendation: Microsoft® Windows® should install a
patch immediately
Caveats: None
Tested Software and Patch Download Locations:
Affected Software:
Microsoft Windows NT Workstation - Download a fix to
patch this issue
Microsoft Windows NT - Download a fix to patch this issue
Microsoft Windows 2000 - Download a fix to patch this
issue
Microsoft Windows XP - Download a fix to patch this
issue
Microsoft Windows Win98 - Download a fix to patch this
issue
Microsoft Windows Server 2003 - Download a fix to patch
this issue
Non Affected Software:
Microsoft Windows Millennium Edition
The software listed above has been tested to determine if
the versions are affected. Other versions are no longer
supported, and may or may not be affected.
Technical Description:
A security vulnerability exists in the Microsoft®
Messenger Service that could allow arbitrary code
execution on an affected system. The vulnerability
results because the Messenger Service does not properly
validate the length of a message before passing it to the
allocated buffer.
An attacker who successfully exploited this vulnerability
could be able to run code with Local System privileges on
an affected system, or could cause the Messenger Service
to fail. The attacker could then take any action on the
system, including installing programs, viewing, changing
or deleting data, or creating new accounts with full
privileges.
Mitigating factors:
Messages are delivered to the Messenger service via
NetBIOS or RPC. If users have blocked the NetBIOS ports
(ports 137-139) - and UDP broadcast packets using a
firewall, others will not be able to send messages to
them on those ports. Most firewalls, including Internet
Connection Firewall in Windows XP, block NetBIOS by
default.
Disabling the Messenger Service will prevent the
possibility of attack.
On Windows Server 2003 systems, the Messenger Service is
disabled by default.
Severity Rating:
Windows NT Critical
Windows Server NT 4.0 Terminal Server Edition Critical
Windows 2000 Critical
Windows XP Critical
Windows Server 2003 Moderate
The above assessment is based on the types of systems
affected by the vulnerability, their typical deployment
patterns, and the effect that exploiting the
vulnerability would have on them.