Microsoft Windows up to Vista CSRSS WINSRV.DLL MessageBox memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.6 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Microsoft Windows up to Vista. Impacted is the function MessageBox in the library WINSRV.DLL of the component CSRSS. Executing a manipulation with the input \??\ can lead to memory corruption.
This vulnerability appears as CVE-2006-6696. In addition, an exploit is available.
It is recommended to use an alternative to replace the affected component.
Details
A vulnerability was found in Microsoft Windows up to Vista (Operating System). It has been declared as critical. This vulnerability affects the function MessageBox in the library WINSRV.DLL of the component CSRSS. The manipulation with the input value \??\ leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (CSRSS) process, which is not properly handled when invoking the UserHardError and GetHardErrorText functions in WINSRV.DLL.
The weakness was presented 12/22/2006 by NULL and Tim Garnett with Determina Security Research as MSRC/ARC (Website). The advisory is shared for download at blogs.technet.com. This vulnerability was named CVE-2006-6696 since 12/21/2006. The attack can only be initiated within the local network. No form of authentication is required for a successful exploitation. Technical details and also a public exploit are known.
It is possible to download the exploit at security.nnov.ru. It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 25024 (MS07-021: Vulnerabilities in CSRSS Could Allow Remote Code Execution (930178)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows : Microsoft Bulletins and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 90374 (Vulnerabilities in CSRSS Could Allow Remote Code Execution (MS07-021)).
Applying a patch is able to eliminate this problem. The bugfix is ready for download at windowsupdate.microsoft.com. The problem might be mitigated by replacing the product with as an alternative. The best possible mitigation is suggested to be establishing an alternative product. A possible mitigation has been published 4 months after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 5273.
The vulnerability is also documented in the databases at X-Force (31018), Exploit-DB (2967), Tenable (25024), SecurityFocus (BID 23324†) and OSVDB (31659†). Additional details are provided at archives.neohapsis.com. See VDB-2324, VDB-2610, VDB-3006 and VDB-4074 for similar entries. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.6VulDB Meta Temp Score: 9.1
VulDB Base Score: 9.6
VulDB Temp Score: 9.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 25024
Nessus Name: MS07-021: Vulnerabilities in CSRSS Could Allow Remote Code Execution (930178)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 801719
OpenVAS Name: Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: AlternativeStatus: 🔍
Reaction Time: 🔍
Exposure Time: 🔍
Patch: windowsupdate.microsoft.com
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
12/14/2006 🔍12/21/2006 🔍
12/21/2006 🔍
12/21/2006 🔍
12/21/2006 🔍
12/22/2006 🔍
12/22/2006 🔍
12/22/2006 🔍
12/23/2006 🔍
04/10/2007 🔍
04/10/2007 🔍
04/10/2007 🔍
08/12/2024 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: MSRC/ARC
Researcher: NULL, Tim Garnett
Organization: Determina Security Research
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-6696 (🔍)
GCVE (CVE): GCVE-0-2006-6696
GCVE (VulDB): GCVE-100-2788
OVAL: 🔍
X-Force: 31018
SecurityFocus: 23324
Secunia: 23448 - Microsoft Windows CSRSS MsgBox Memory Corruption Vulnerability, Highly Critical
OSVDB: 31659 - Microsoft Windows CSRSS MessageBox Function Privilege Escalation
SecurityTracker: 1017433
SecuriTeam: securiteam.com
Vulnerability Center: 13554 - [MS07-021] Windows Double-Free Vulnerability Allows Local/User-Assisted Privilege Escalation, Critical
Vupen: ADV-2007-1325
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 12/22/2006 10:45Updated: 08/12/2024 04:29
Changes: 12/22/2006 10:45 (105), 07/28/2018 08:32 (10), 03/15/2021 07:14 (4), 08/12/2024 04:29 (17)
Complete: 🔍
Cache ID: 216:F74:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.