Reported July 9, 2003, by Microsoft.
Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Terminal Server Edition
Microsoft Windows 2000
Microsoft Windows XP
A new vulnerability exists in Microsoft Windows NT 4.0, Windows 2000 and Windows XP operating systems that can result in the execution of arbitrary code on the vulnerable computer. This vulnerability stems from a flaw in the way the server validates the parameters of a Server Message Block (SMB) packet. By sending a specially crafted SMB packet request, a potential attacker could cause a buffer overrun to occur, leading to data corruption, system failure, or execute arbitrary code on the vulnerable system.
Microsoft has released Security Bulletin MS03-024, "Buffer Overrun in Windows Could Lead to Data Corruption (817606)" to address this vulnerability and recommends that affected users immediately apply the patch mentioned in the bulletin.
Discovered by Jeremy Allison and Andrew Tridgell.