----------------------------------------------------------------------

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.

Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/

----------------------------------------------------------------------

TITLE:
Microsoft Windows Services for UNIX Privilege Escalation

SECUNIA ADVISORY ID:
SA26757

VERIFY ADVISORY:
http://secunia.com/advisories/26757/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows Storage Server 2003
http://secunia.com/product/12399/
Microsoft Windows Vista
http://secunia.com/product/13223/

SOFTWARE:
Microsoft Windows Services for UNIX 3.x
http://secunia.com/product/5244/

DESCRIPTION:
A vulnerability has been reported in Microsoft Windows Services for
UNIX, which can be exploited by malicious, local users to gain
escalated privileges.

The vulnerability is caused due to an unspecified error in Windows
Services for UNIX and the Subsystem for UNIX-based Applications
component when handling connection credentials for setuid binaries.
This can be exploited to execute arbitrary code with escalated
privileges by running a specially crafted setuid binary.

Successful exploitation requires that Windows Services for UNIX is
installed or the Subsystem for UNIX-based Applications component is
enabled (disabled by default).

NOTE: According to Microsoft, "limited distribution" of the
vulnerability details already exists.

SOLUTION:
Apply patches.

Windows 2000 SP4 with Windows Services for UNIX 3.0:
http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277

Windows 2000 SP4 with Windows Services for UNIX 3.5:
http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663

Windows XP SP2 with Windows Services for UNIX 3.0:
http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277

Windows XP SP2 with Windows Services for UNIX 3.5:
http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663

Windows Server 2003 SP1/SP2 with Windows Services for UNIX 3.0:
http://www.microsoft.com/downloads/details.aspx?FamilyId=557f89fc-c5d9-4405-9007-1654abf92277

Windows Server 2003 SP1/SP2 with Windows Services for UNIX 3.5:
http://www.microsoft.com/downloads/details.aspx?FamilyId=70ae23c2-3ae8-4ea6-ba8d-8ac7e4f82663

Windows Server 2003 SP1/SP2 with Subsystem for UNIX-based
Applications:
http://www.microsoft.com/downloads/details.aspx?FamilyId=8ab5cc43-0b9c-45eb-aa51-47568ab6ce3f

Windows Server 2003 x64 Edition (optionally with SP2) with Subsystem
for UNIX-based Applications:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1d21e3e8-b5f6-4044-9db6-054af836492b

Window Vista with Subsystem for UNIX-based Applications:
http://www.microsoft.com/downloads/details.aspx?FamilyId=4d52e4f4-2888-42df-8163-85c648e65b29

Windows Vista x64 Edition with Subsystem for UNIX-based
Applications:
http://www.microsoft.com/downloads/details.aspx?FamilyId=4be667cc-c239-480b-a9a0-939bcd27f0de

PROVIDED AND/OR DISCOVERED BY:
Reported as a 0-day.

ORIGINAL ADVISORY:
MS07-053 (KB939778):
http://www.microsoft.com/technet/security/Bulletin/MS07-053.mspx

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------