exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

nai.99-12-16.lsa

nai.99-12-16.lsa
Posted Dec 17, 1999

Network Associates, Inc. Security Advisory - Windows NT LSA Remote Denial of Service. An implementation flaw in the Local Security Authority subsystem of Windows NT, known as the LSA, allows both local or remote attackers to halt the processing of security information requiring the host to be restarted. This new vulnerability affects all Windows NT 4.0 hosts including those with Service packs up to and including SP6a. ms99-057 addresses this vulnerability. NAI homepage here.

tags | remote, denial of service, local
systems | windows
SHA-256 | d0c637cd4cedf750ac593d89bda9710934543e70938f9ef2d5f35184d7963107

nai.99-12-16.lsa

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

======================================================================

Network Associates, Inc.
SECURITY ADVISORY
December 16, 1999

Windows NT LSA Remote Denial of Service

======================================================================

SYNOPSIS

An implementation flaw in the Local Security Authority subsystem of
Windows NT, known as the LSA, allows both local or remote attackers
to halt the processing of security information requiring the host to
be restarted.


======================================================================

VULNERABLE HOSTS

This new vulnerability affects all Windows NT 4.0 hosts including
those with Service packs up to and including SP6a.


======================================================================

DETAILS

The Local Security Authority is the center of the Windows NT security
subsystem. The LSA is a user-mode process (LSASS.EXE) used to
maintain
security information of a system known as the Local Security Policy.
The Local Security Policy is stored in the registry and includes such
information as who has permission to access the system, who is
assigned privileges and what security auditing is performed.

The majority of the security subsystem components run within the
context of the LSASS process, including the Security Accounts Manager
(SAM) that is responsible for maintaining the SAM database stored in
the registry. Also the default authentication package (MSV1_0.DLL)
that determines whether username and password match information
stored in the SAM database.

In addition other user-mode processes request services from the LSA
such as the login process (WINLOGON.EXE) to authenticate username and
passwords that are entered when interactive users logon and logoff.
Also, the network logon service (SERVICES.EXE) which responds to
network logon requests also utilizes the LSA to verify
authentication.

Disrupting the Local Security Authority halts almost all user-mode
security authentication requiring a Windows NT host to be restarted.


======================================================================

TECHNICAL DETAILS

Windows NT provides the ability to open and manipulate the LSA
through an series of APIs. To programmatically manage the Local
Security Policy of a local or remote system a session is established
with that system's Local Security Authority. If a session is
successfully established an LSA Policy handle will be returned for
usage in all subsequent API calls.

One specific API LsaLookupSids() utilizes the LSA to map one or more
SIDs of user accounts, group accounts, alias accounts or domains to
names. Invalid arguments passed to this API are incorrectly verified
causing the LSA process to reference invalid memory resulting in an
application error.


======================================================================

RESOLUTION

Microsoft has issued a patch for this vulnerability, which can be
obtained at the following address:

x86:

http://www.microsoft.com/downloads/release.asp?ReleaseID=16798

Alpha:

http://www.microsoft.com/downloads/release.asp?ReleaseID=16799


Microsoft's Security Bulletin for this vulnerability can be found at:

http://www.microsoft.com/security/bulletins/ms99-057.asp


Additional information can be found in Microsoft Knowledge Base
article Q248185, SID Enumeration Function in LSA May Not Handle
Argument Properly:

http://support.microsoft.com/support/kb/articles/q248/1/85.asp


======================================================================

CREDITS

Discovery and documentation of this vulnerability was conducted
by Anthony Osborne of the Security Labs at Network Associates.


======================================================================

ABOUT THE NETWORK ASSOCIATES SECURITY LABS

The Security Labs at Network Associates hosts some of the most
important research in computer security today. With over 30
security advisories published in the last 2 years, the Network
Associates security auditing teams have been responsible for the
discovery of many of the Internet's most serious security flaws.
This advisory represents our ongoing commitment to provide
critical information to the security community.

For more information about the Security Labs at Network
Associates, see our website at http://www.nai.com or contact us
at <seclabs@nai.com>.


======================================================================

NETWORK ASSOCIATES SECURITY LABS PGP KEY

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP 6.5.1
Comment: Crypto Provided by Network Associates <http://www.nai.com>
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=hS6P
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1
Comment: Crypto Provided by Network Associates <http://www.nai.com>

iQA/AwUBOFl9rqF4LLqP1YESEQLqjACdHBJqVbpcaY/UPGc786YIYUsFOXEAoPU6
vvddKskLOhBL8iPzrwNQmIGM
=9sg6
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close