Resolved Vulnerability in the SMAPI Port (258060)
The information in this article applies to:
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Professional
This article was previously published under Q258060 SYMPTOMS
Microsoft has discovered a vulnerability that can be exploited when someone tries to connect to a Simple Messaging Application Programming Interface (SMAPI) port if, while the server is accepting the connection, that process is stopped. This action generates heap corruption that may cause the server to stop responding (hang).
CAUSE
This problem occurs because SmpHandleConnectionRequest frees ClientContext after a successful call to NtAcceptConnectPort. When Smss.exe receives an LPC_PORT_CLOSED message, an exception is generated because it attempts to close the client handle, but ClientContext has already been closed.
RESOLUTIONTo resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the
Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
STATUSMicrosoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 1.
Modification Type: | Minor | Last Reviewed: | 9/26/2005 |
---|
Keywords: | kbHotfixServer kbQFE kbbug kbfix kbQFE kbWin2000SP1Fix KB258060 |
---|
|