Follow:

Vulnerability:Win/TAPSRV.Client.RCE!CAN-2005-0058

Severity rating
Critical

Class/Type
Vulnerability

Discovered date
2005-08-09T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
Yes

Signature detection
Medium



On this page




Description

A remote code execution vulnerability exists in Telephony Application Programming Interface (TAPI).



Impact

An attacker who successfully exploited this vulnerability could take complete control of the affected system.



Technical details (analysis)

The Telephony service provides support for Telephony Application Programming Interface (TAPI). TAPI integrates telecommunications with the operating system. TAPI supports both traditional and IP telephony to provide voice, data, and video communication. A buffer overflow exists in a function of the TAPI service on cetain MS platforms. Due to insufficient bounds checking, a crafted network request to this service can result in RCE.



Affected software

Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) Review the FAQ section of this bulletin for details about these operating systems.



Non-affected software

All those not on affected applications list.



References




Solutions




NIS signature

Name: Vulnerability:Win/TAPSRV.Client.RCE!CAN-2005-0058
Release Date: 2005-08-09T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

Disable the Telephony service.