what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-009

ms01-009
Posted Feb 16, 2001

Microsoft Security Advisory MS01-009 - The PPTP service in Windows NT 4.0 has a flaw which allows remote attackers to crash the service via a malformed packet. Microsoft FAQ on this issue available here.

tags | remote
systems | windows
SHA-256 | 9f459f1211e41897038aebbe45c2bfbccf92f8c2231699929744255277097d75

ms01-009

Change Mirror Download
The following is a Security  Bulletin from the Microsoft Product Security
Notification Service.

Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************

-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Patch Available for "Malformed PPTP Packet Stream"
Vulnerability
Date: 13 February 2001
Software: Windows NT 4.0 servers running PPTP
Impact: Denial of service
Bulletin: MS01-009

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-009.asp.
- ----------------------------------------------------------------------

Issue:
======
The PPTP service in Windows NT 4.0 has a flaw in a part of the code
that handles a particular type of data packet, which results in a
leak of kernel memory. If a sufficient number of packets containing
a specific malformation were received by an affected server, kernel
memory would eventually become exhausted. The likely outcome would be
that the server would either hang or fail altogether. In either
case, the machine would need to be rebooted to restore normal
operation, and any PPTP sessions underway at the time would be lost.
It would not be necessary for the attacker to establish a valid PPTP
session in order to exploit the vulnerability.

Mitigating Factors:
====================
- The vulnerability does not threaten the security of data within
PPTP sessions -- it is strictly a denial of service vulnerability.
- Only Windows NT 4.0 machines running the PPTP service are at risk.
The service does not run by default.
- The Windows 2000 PPTP service is not affected by the
vulnerability.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-009.asp
for information on obtaining this patch.

Acknowledgment:
===============
- Kirk Corey of Diversified Software Industries, Inc.
(www.dsi-inc.net)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOomSeo0ZSRQxA/UrAQEciwf/a6hH3dCeDNjzohPMkiyYcWjG1xMR7tZ8
46er4RrKpH24Gf7x5Oy9YLu3sY3S3Ga+bKh7f3Rku8RJQq92tGU7tBFoW9/w4Ini
oz2Q5035Hh8aGZBHW6d9OmOpGKh8OAROTjCDyoyaj2WWFHh28XHowQ+OWyTAWbec
aZlXMmOCuT+BJBjHSt++wkoPufaFJPCkggXilMHGnraWhEYR6bYxxumqCdEQXNhU
nVrzj0RX3DWAfj/kj3SGPVskGay5s8sOLLji/Hhr6Va+tMlS/Aa7ZJ/oZ7tlQIdg
yi8HO1Q+0NyARnc+i5RmuNpWRpfb46o0hht//F5nv6jM1cjyar0uAA==
=XupL
-----END PGP SIGNATURE-----

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close