Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.345 -- Microsoft Security Bulletin MS01-043 NNTP Service in Windows NT 4.0 and Windows 2000 Contains Memory Leak 16 August 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: NNTP Service Vendor: Microsoft Operating System: Windows NT 4.0 Windows 2000 Impact: Denial of Service Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ---------------------------------------------------------------------- Title: NNTP Service in Windows NT 4.0 and Windows 2000 Contains Memory Leak Date: 14 August 2001 Software: Windows NT 4.0, Windows 2000 Impact: Denial of service Bulletin: MS01-043 Microsoft encourages customers to review the Security Bulletin at: http://www.microsoft.com/technet/security/bulletin/MS01-043.asp. - - ---------------------------------------------------------------------- Issue: ====== The NNTP (Network News Transport Protocol) service in Windows NT 4.0 and Windows 2000 contains a memory leak in a routine that processes news postings. Each time such a posting is processed that contains a particular construction, the memory leak causes a small amount of memory to no longer be available for use. If an attacker sent a large number of posts, the server memory could be depleted to the point at which normal service would be disrupted. An affected server could be restored to normal service by rebooting. Mitigating Factors: ==================== - Windows NT 4.0 does not contain a native NNTP service. NNTP is only available on the system if the Windows NT 4.0 Option Pack has been installed. - The default configuration of NNTP is not affected by the vulnerability, as no newsgroups are configured by default. - The vulnerability would not enable an attacker to usurp any administrative control or compromise data on the machine. Patch Availability: =================== - A patch is available to fix this vulnerability. Please read the Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms01-043.asp for information on obtaining this patch. Acknowledgment: =============== - Aiden ORawe - - --------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. - -----BEGIN PGP SIGNATURE----- Version: PGP 7.1 iQEVAwUBO3nBYo0ZSRQxA/UrAQEE0gf+MtGVrVnzY49gW8FN4Db3/2kGn0HGzpTx HGsqruIKgNcz6H5dZVt2TGGdnPaBLXbRXyT7L+Ibgu2aEZ8QQLzVu0kkOvvrFv0s 7e8z2r4CB241g1CIIiSxDQNKhS3LWBLDMOrA2lWcCewIVwzThHGTTXv9m3i605rU 6H9sI9ZememeDG3hA3D68TrdPzWSe6HfLowpFM5tboyCAOK6S8vUQMfZizkpdLA4 P1qXHod4KL+q8V8XKf8+XefPs/gkCsA8XcA1UfROl8Y3V0erhfcO7lGr7NwXpobO c6v1zjm7etF8D1fdSeepCxxz+6orhmkAq9Dy5WIL/Zpvb/qsANR/qA== =EtWv - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO3uS2Ch9+71yA2DNAQEkwwP/X+MiBrOQCeJorWSSQq6Oo12yt6afE9et ibqT9sElxpIyF/Zgj6O1k/4VHSrnQfWChW3/p82EzsjTge0MbNxONik/t0BquN7C 3rbpWa/9GlGvJrIaBZmeTbaL4zuL1FM0p4f33A3PKipSU0IrdA/OjYeb1T3WXfcO eQc6dg+UkK0= =uvOY -----END PGP SIGNATURE-----