The following is a Security Bulletin from the Microsoft Product
Security Notification Service.
Please do not reply to this message, as it was sent from an
unattended mailbox.
********************************
-----BEGIN PGP SIGNED MESSAGE-----
- -
- ----------------------------------------------------------------------
Title: Invalid RDP Data can Cause Terminal Service Failure
Date: 18 October 2001
Revised: 22 October 2001 (version 2.0)
Software: Windows NT 4.0 Server, Terminal Server Edition,
Windows 2000 Server and Advanced Server
Impact: Denial of service
Max Risk: Moderate
Bulletin: MS01-052
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-052.asp.
- - -
- -
- ----------------------------------------------------------------------
Reason for Revision:
====================
On October 18, 2001 Microsoft released the original version of this
bulletin. On October 19, 2001, an issue was identified with the Windows
2000 patch. The patch was withdrawn so that it could be updated and
re-released. On October 22, 2001 the updated patch and bulletin were
posted.
We recommend that customers who installed the original version of the
Windows 2000 patch install the updated version.
Issue:
======
The implementation of the Remote Data Protocol (RDP) in the terminal
service in Windows NT 4.0 and Windows 2000 does not correctly handle a
particular series of data packets. If such a series of packets were
received by an affected server, it would cause the server to fail. The
server could be put back into normal service by rebooting it, but any
work in progress at the time of the attack would be lost.
It would not be necessary for an attacker to be able to start a session
with an affected server in order to exploit this vulnerability - the
only prerequisite would be the need to be able to send the correct
series of packets to the RDP port on the server.
Mitigating Factors:
====================
- There is no capability to breach the security of a terminal
server session via this vulnerability, or to add, change or
delete data on the server. It is a denial of service
vulnerability only.
- The specific sequence of data packets involved in this
vulnerability cannot be generated as part of a legitimate
terminal server session.
Risk Rating:
============
- Internet systems: Low
- Intranet systems: Moderate
- Client systems: None
Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms01-052.asp
for information on obtaining this patch.
Acknowledgment:
===============
- Luciano Martins of Deloitte & Touche Argentina
(http://www.deloitte.com.ar)
- - -
- -
- ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN
NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com
------
You are subscribed as [email protected]
Archives: http://www.swynk.com/sitesearch/search.asp
To unsubscribe send a blank email to [EMAIL PROTECTED]