Microsoft Windows is prone to a remote code-execution vulnerability that affects RPC (Remote Procedure Call) handling in the Server service.
An attacker could exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of vulnerable computers. This issue may be prone to widespread automated exploits.
Attackers require authenticated access on Windows Vista and Server 2008 platforms to exploit this issue.
This vulnerability affects Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
Information
Siemens SPECT Workplaces/Symbia.net 0
Siemens SPECT Systems 0
Siemens PET/CT Systems 0
Nortel Networks Symposium Agent
Nortel Networks Self-Service WVADS 0
Nortel Networks Self-Service Speech Server 0
Nortel Networks Self-Service Peri Workstation 0
Nortel Networks Self-Service Peri Application 0
Nortel Networks Self-Service MPS 500 0
Nortel Networks Self-Service MPS 1000 0
Nortel Networks Self-Service MPS 100 0
Nortel Networks Self-Service Media Processing Server 0
Nortel Networks Self-Service CCXML 0
Nortel Networks Self-Service - CCSS7 0
Nortel Networks Self Service VoiceXML 0
Nortel Networks Multimedia Comm MCS5100
Nortel Networks Enterprise Network Management System
Nortel Networks Contact Center NCC 0
Nortel Networks Contact Center Manager Server 0
Nortel Networks Contact Center Manager
Nortel Networks Contact Center Express
Nortel Networks Contact Center - TAPI Server 0
Nortel Networks Contact Center - Quality Monitoring 0
Nortel Networks Contact Center - Contact Recording 0
Nortel Networks Contact Center - CCT 5
Nortel Networks Contact Center - CCT 0
Nortel Networks CallPilot 703t
Nortel Networks CallPilot 600r
Nortel Networks CallPilot 201i
Nortel Networks CallPilot 1005r
Nortel Networks CallPilot 1002rp
Microsoft Windows XP Tablet PC Edition SP3
Microsoft Windows XP Tablet PC Edition SP2
Microsoft Windows XP Tablet PC Edition SP1
Microsoft Windows XP Tablet PC Edition
Microsoft Windows XP Professional x64 Edition SP2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows XP Professional SP3
Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Media Center Edition SP3
Microsoft Windows XP Media Center Edition SP2
Microsoft Windows XP Media Center Edition SP1
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Home SP3
Microsoft Windows XP Home SP2
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP Gold 0
Microsoft Windows XP 64-bit Edition Version 2003 SP1
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 0
Microsoft Windows Vista x64 Edition SP1
Microsoft Windows Vista x64 Edition 0
Microsoft Windows Vista Ultimate 64-bit edition SP1
Microsoft Windows Vista Ultimate 64-bit edition 0
Microsoft Windows Vista Home Premium 64-bit edition SP1
Microsoft Windows Vista Home Premium 64-bit edition 0
Microsoft Windows Vista Home Basic 64-bit edition SP1
Microsoft Windows Vista Home Basic 64-bit edition 0
Microsoft Windows Vista Enterprise 64-bit edition SP1
Microsoft Windows Vista Enterprise 64-bit edition 0
Microsoft Windows Vista Business 64-bit edition SP1
Microsoft Windows Vista Business 64-bit edition 0
Microsoft Windows Vista Ultimate SP1
Microsoft Windows Vista Ultimate
Microsoft Windows Vista SP1
Microsoft Windows Vista Home Premium SP1
Microsoft Windows Vista Home Premium
Microsoft Windows Vista Home Basic SP1
Microsoft Windows Vista Home Basic
Microsoft Windows Vista Enterprise SP1
Microsoft Windows Vista Enterprise
Microsoft Windows Vista Business SP1
Microsoft Windows Vista Business
Microsoft Windows Vista beta 2
Microsoft Windows Vista Beta 1
Microsoft Windows Vista Beta
Microsoft Windows Vista 0
Microsoft Windows Server 2008 Standard Edition 0
Microsoft Windows Server 2008 for x64-based Systems 0
Microsoft Windows Server 2008 for Itanium-based Systems 0
Microsoft Windows Server 2008 for 32-bit Systems 0
Microsoft Windows Server 2008 Enterprise Edition 0
Microsoft Windows Server 2008 Datacenter Edition 0
Microsoft Windows Server 2003 x64 SP2
Microsoft Windows Server 2003 x64 SP1
Microsoft Windows Server 2003 Web Edition SP2
Microsoft Windows Server 2003 Web Edition SP1 Beta 1
Microsoft Windows Server 2003 Web Edition SP1
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard x64 Edition
Microsoft Windows Server 2003 Standard Edition SP2
Microsoft Windows Server 2003 Standard Edition SP1 Beta 1
Microsoft Windows Server 2003 Standard Edition SP1
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Itanium SP2
Microsoft Windows Server 2003 Itanium SP1
Microsoft Windows Server 2003 Itanium 0
Microsoft Windows Server 2003 Enterprise x64 Edition SP2
Microsoft Windows Server 2003 Enterprise x64 Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Beta 1
Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Enterprise Edition SP1 Beta 1
Microsoft Windows Server 2003 Enterprise Edition SP1
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter x64 Edition SP2
Microsoft Windows Server 2003 Datacenter x64 Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Beta 1
Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
Microsoft Windows Server 2003 Datacenter Edition SP1
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 SP2
Microsoft Windows Server 2003 SP1
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Advanced Server SP4
Avaya Messaging Application Server MM 3.1
Avaya Messaging Application Server MM 3.0
Avaya Messaging Application Server MM 2.0
Avaya Messaging Application Server MM 1.1
Avaya Messaging Application Server 0
Exploit
Attackers can use readily available tools to exploit this issue.
NOTE: Microsoft indicates that this issue is being exploited in the wild.
Reports indicate that this issue is being exploited in the wild by 'Trojan.Gimmiv.A'. Please see the references for more information.
The following Windows 2000 proof of concept and exploit are available to members of the Immunity Partners program:
https://www.immunityinc.com/downloads/immpartners/ms08_067.tgz
https://www.immunityinc.com/downloads/immpartners/ms08_067-2.tgz
Immunity has released the following Windows XP SP3 exploit to members of the Immunity Partners program:
https://www.immunityinc.com/downloads/immpartners/ms08_067-3.tgz
Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following Metasploit exploit module is available:
https://metasploit.com/ms08_067_netapi.rb
NOTE: A worm is exploiting this vulnerability in the wild. Symantec detects it as 'W32.Wecorl'. Please see the references for more information.
UPDATE (November 22, 2008): An additional worm ('W32.Downadup') has been detected. This worm propagates over TCP port 445.
UPDATE: (December 31, 2008): A new variant of the Downadup worm ('W32.Downadup.B') is propagating in the wild.
The following proof-of-concept and exploit code are available:
Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
References:
- Advance Notification for Out-of-Band Release (Microsoft)
- Centralized Information About The Conficker Worm (Microsoft)
- Gimmiv.A exploits critical vulnerability (MS08-067) (Sergei Shevchenko)
- Microsoft out-of-band Security Bulletin (MS08-067) Webcast Q&A (Microsoft)
- More detail about MS08-067, the out-of-band netapi32.dll security update (Microsoft Security Vulnerability Research & Defense)
- MS08-067 Released (Microsoft Security Response Center (MSRC))
- New Information Pages on Conficker (Microsoft Security Response Center (MSRC))
- Trojan.Gimmiv.A (Symantec)
- W32.Wecorl (Symantec)
- Re: [Full-disclosure] Windows RPC worm (MS08-067) in the wild (Juha-Matti Laurio
) - Windows RPC MS08-067 FAQ document released (Juha-Matti Laurio
) - Windows RPC worm (MS08-067) in the wild (Juha-Matti Laurio
) - 2008009147 Nortel Response to Microsoft Security Bulletin MS08-067 (Nortel Networks)
- ASA-2008-427 MS08-067 Vulnerability in Server Service Could Allow Remote Code Ex (Avaya)
- ICSMA-17-215-01: Siemens Molecular Imaging Vulnerabilities (CERT)
- Microsoft Security Advisory (958963) (Microsoft)
- Microsoft Security Bulletin Advance Notification for October 2008 (Microsoft)
- Microsoft Security Bulletin MS08-067 â?? Critical (Microsoft)
- Nortel Response to Microsoft Security Bulletin MS08-067 (Nortel Networks)
- Nortel Response to Microsoft Security Bulletin MS08-067 -rev 3 (Nortel Networks)
- Vulnerability Note VU#827267 (US-CERT)