-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
              AUSCERT External Security Bulletin Redistribution
                             
           ESB-2000.273 -- Microsoft Security Bulletin (MS00-070)
       Patch Available for Multiple LPC and LPC Ports Vulnerabilities
                               4 October 2000

===========================================================================

	AusCERT Security Bulletin Summary
	---------------------------------

Product:                LPC (Local Procedure Call) and LPC ports
Vendor:                 Microsoft
Operating System:       Windows NT 4.0
                        Windows 2000 
Impact:                 Administrator Compromise
                        Denial of Service
Access Required:        Local

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

Microsoft Security Bulletin (MS00-070)
- - --------------------------------------

Patch Available for Multiple LPC and LPC Ports Vulnerabilities

Originally posted: October 03, 2000

Summary
=======
Microsoft has released a patch that eliminates several security
vulnerabilities in Microsoft(r) Windows NT(r) 4.0 and  Windows(r)
2000. The vulnerabilities could allow a range of effects, from denial
of service attacks to, in some cases,  privilege elevation.

Frequently asked questions regarding this vulnerability and the
patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-070.asp.

Issue
=====
Several vulnerabilities have been identified in the Windows NT 4.0
and Windows 2000 implementations of LPC and LPC ports:
 - The "Invalid LPC Request" vulnerability, which affects only
   Windows NT 4.0. By levying an invalid LPC request, it would
   be possible to make the affected system fail.
 - The "LPC Memory Exhaustion" vulnerability, which affects both
   Windows NT 4.0 and Windows 2000. By levying spurious LPC
   requests, it could be possible to increase the number of
   queued LPC messages to the point where kernel memory would
   be depleted.
 - The "Predictable LPC Message Identifier" vulnerability,
   which affects both Windows NT 4.0 and Windows 2000. Any
   process that knows the identifier of an LPC message can
   access it; however, the identifiers can be predicted. In the
   simplest case, a malicious user could access other process'
   LPC ports and feed them random data as a denial of service
   attack. In the worst case, it could be possible under certain
   conditions to send bogus requests to a privileged process in
   order to gain additional local privileges
 - A new variant of the previously-reported "Spoofed LPC Port
   Request" vulnerability. (For more information, please see
   http://www.microsoft.com/technet/security/bulletin/ms00-003.asp).
   This vulnerability affects Windows NT 4.0 and Windows 2000,
   and could, under a very restricted set of conditions, allow
   a malicious user to create a process that would run under
   the security context of an already-running process,
   potentially including System processes.

Because LPC can only be used on the local machine, none of these
vulnerabilities could be exploited remotely. Instead, a  malicious
user could only exploit them on machines that he could log onto
interactively. Typically, workstations and terminal  servers would be
chiefly at risk, because, if normal security practices have been
followed, normal users will not be allowed  to log onto critical
servers interactively. This also means that, even in the worst case,
the vulnerability would only confer  additional local - not domain -
privileges on the malicious user.

Affected Software Versions
==========================
 - Microsoft Windows NT 4.0 Workstation
 - Microsoft Windows NT 4.0 Server
 - Microsoft Windows NT 4.0 Server, Enterprise Edition
 - Microsoft Windows NT 4.0 Server, Terminal Server Edition
 - Microsoft Windows 2000 Professional
 - Microsoft Windows 2000 Server
 - Microsoft Windows 2000 Advanced Server
 - Microsoft Windows 2000 Datacenter Server

Patch Availability
==================
 - Microsoft Windows NT 4.0 Workstation, Server, and Server,
   Enterprise Edition:
   http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24650
 - Microsoft Windows NT 4.0 Server, Terminal Server Edition:
   To be released shortly
 - Microsoft Windows 2000 Professional, Server, Advanced Server,
   and Datacenter Server:
   http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24649

Note: The Windows NT 4.0 patch can be installed on systems running
Service Pack 6a, and will be included in Service Pack 7.  The Windows
2000 patch can be installed on systems with or without Service Pack
1, and will be included in Service Pack 2.

Note: Additional security patches are available at the Microsoft
Download Center

More Information
================
Please see the following references for more information related to
this issue.
 - Frequently Asked Questions: Microsoft Security Bulletin MS00-070,
   http://www.microsoft.com/technet/security/bulletin/fq00-070.asp
 - Microsoft Knowledge Base article Q266433 discusses this issue
   and will be available soon.
 - Microsoft TechNet Security web site,
   http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments
===============
Microsoft thanks  BindView's Razor Team (http://razor.bindview.com)
for reporting these issues to us and helping us protect  our
customers. The issues involved in these vulnerabilities required
several months of detailed engineering, and BindView  worked closely
with us throughout the process. We'd like to thank them for their
ongoing commitment to responsible reporting  practices.

Revisions
=========
 - October 03, 2000: Bulletin Created.

- - ---------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT  DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT,  INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS  SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF  LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.

Last Updated  October 03, 2000

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.


- -----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOdptcI0ZSRQxA/UrAQH2Jgf+INzTccmFKM66Zhg+nvVrH1QnqitGde6u
yBrXlhJZLp+6n+Fl8CdvueEwL6sfpiltbHYJ/JyqvdFvJN7TLdDWa2gNfcoZh1is
F4HklQSZvdb+ddQwS7rBiLV0RwNzYLPVabxxRk/TnHqA8PFaZXy+Sd9/ygGhIgss
9SKFaCrLRaGM2p6vL/pTSrmv7Kup6g5qg7e8kK9H6aGXxw0XXic4RH0YEBROX3Oq
3o9QPfbfcqFr5dr8utixTsXBSlZRa6si27NzQRvglka/GrJPF9YTUodfQUYwr9mI
CAPJBPS1Uu9AyraKyD9bzNpvju53YoOeJU11dgYqBH4CsB8WX3u5CA==
=xASC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOlSM5yh9+71yA2DNAQFhCAP/Z5oekFiYw3klsnvdDjN0glixLDhFNOmV
zBKAZE4fnr2Y7tVGcgEYV6UbsS5b7R3VWM5ak7ktb26TjLeZw7Qad38dkSJKZvWi
B1lwsfhfKnWwQ1OCNCWbRQ71PCU2Sw0a9f0lqkMbGGlebI6HkBsdIzLcoJlQTGQ7
ykV3S4oC5zY=
=IZU3
-----END PGP SIGNATURE-----