When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Microsoft Security Bulletin MS02-006

Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run

Originally posted: February 12, 2002 Updated: March 5, 2002

Summary

Who should read this bulletin: System administrators who use Simple Network Management Protocol to manage Microsoft® Windows® 95, 98, 98SE, Windows NT® 4.0, Windows 2000 or Windows XP systems. Impact of vulnerability: Denial of Service, potentially run code of attacker's choice.

Maximum Severity Rating: Moderate

Recommendation: Customers using SNMP on Windows 2000 and Windows XP should apply the patch. All other customers should disable SNMP service if running; apply patch when available

Affected Software:

Microsoft Windows 95

Microsoft Windows 98

Microsoft Windows 98SE

Microsoft Windows NT 4.0

Microsoft Windows NT 4.0 Server, Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Vulnerability identifier: CAN-2002-0053

Tested Versions:

Microsoft tested Windows 95, Windows 98, Windows 98SE, Windows ME, Windows NT 4.0, Windows 2000, and Windows XP to assess whether they are affected by this vulnerability. Previous versions are no longer supported, and may or may not be affected by these vulnerabilities.

Patch availability

Download locations for this patch

Windows NT 4.0:

https://www.microsoft.com/downloads/release.asp?ReleaseID=36167

Windows 2000:

https://www.microsoft.com/downloads/release.asp?ReleaseID=36142

Windows XP:

https://www.microsoft.com/downloads/release.asp?ReleaseID=36262

Patches for other platforms are under development and will be available shortly. When this happens, we will re-release this bulletin with information on how to obtain and install these patches.

News source: Microsoft Security Email

Report a problem with article
Next Article

Thanks to you we're #1

Previous Article

Wierd: Man Changes His Name To Playstation 2