Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.051 -- Microsoft Security Bulletin MS01-006 Patch Available for "Invalid RDP Data" Vulnerability 8 February 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Remote Data Protocol (RDP) in Windows 2000 Terminal Services Vendor: Microsoft Operating System: Windows 2000 Server Windows 2000 Advanced Server Impact: Denial of Service Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ---------------------------------------------------------------------- Title: Patch Available for "Invalid RDP Data" Vulnerability Date: 31 January 2001 Software: Windows 2000 Terminal Services Impact: Denial of Service Bulletin: MS01-006 KB Article: Q286132 (Available Soon) Microsoft encourages customers to review the Security Bulletin at: http://www.microsoft.com/technet/security/bulletin/MS01-006.asp. - - ---------------------------------------------------------------------- Issue: ====== The implementation of the Remote Data Protocol (RDP) in Windows 2000 Terminal Service does not correctly handle a particular series of data packets. If such a series of packets were received by an affected server, it would cause the server to fail. The server could be put back into normal service by rebooting it, but any work in progress at the time of the attack would be lost. It would not be necessary for an attacker to be able to start a session with an affected server in order to exploit this vulnerability - he would only need the ability to send the correct series of packets to the RDP port on the server. The specific sequence of data packets involved in this vulnerability cannot be generated as part of a legitimate terminal server session. Windows NT 4.0 terminal servers are not affected by this vulnerability. Mitigating Factors: ==================== - Port 3389 is typically blocked at firewall. If this is done, the vulnerability could not be exploited from the Internet. - Vulnerability does not affect Windows 2000 servers that are not running Terminal Services. Patch Availability: =================== - A patch is available to fix this vulnerability. Please read the Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms01-006.asp for information on obtaining this patch. Acknowledgment: =============== - Yoichi Ubukata and Yoshihiro Kawabata - - --------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. - -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQEVAwUBOniEEY0ZSRQxA/UrAQGuNwf/akiCvM7nVgKs4ivpKKOA93yHK44N07rr ENkSlR0FQxxb5qLrTO/+JJQDuczhaHx1vELECWUpbs6A1kcWgQli/iVUfDQhHm3p DRxocn9S+zufNzzW5kc5WMZeaKv35lDYr6XfRD9huJlkwkzwbEzqzx2Ld7pl5EUR MxCwrd0Eqld4L5flCltWmE9m7YW9f3ZVmrvbK1QPZfSChPsE0+UI2ISvtbOiGQK/ Eg98J0Z4Rkysfiu57/oJkYWGTMITh4z3zCOh4G4mSmBSYKfndIcPRRKf0wp+h4/n 2xZIhM3aq0jKBJ+3662N8Twc+C7qnc1AHz8mIws5Y2RFm620RDdM6g== =ChwQ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOoKF/Ch9+71yA2DNAQHKbAP9Hx8SP5vvnQqn2+HzEt0BOc2yTATjziyn xjueJuG3iwuPkE2DuEDXl1MqOHPHHhPx8R0V2cCJiB1w83S3ZhuPfAFYvjhSUyTm igj/GMysVrCBY3jeqZ/Mdlk4Sve/OHu++BPO4aYEdFkSh0FaIkWUbyr4YmzYwFg6 Kr3CPTTkeuE= =/zDw -----END PGP SIGNATURE-----