what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

razor.ms_rpc_vuln_oct12_2004.txt

razor.ms_rpc_vuln_oct12_2004.txt
Posted Oct 24, 2004
Site bindview.com

Bindview Advisory - Critical Flaw in rpc__mgmt_inq_stats. A remote attacker can read large amounts of memory from and/or crash any NT4 RPC server.

tags | advisory, remote
advisories | CVE-2004-0569
SHA-256 | 4cc245fa9536dd03ba6b06c540bb025befec2fbddae044eec8fd9ed16b789535

razor.ms_rpc_vuln_oct12_2004.txt

Change Mirror Download
BindView Security Advisory: Critical Flaw in rpc__mgmt_inq_stats

Remote anonymous attackers can read large amounts of memory from and/or crash any NT4 RPC server



Issue Date: 12Oct2004
Contact: loveless@bindview.com
Author: Todd Sabin

Topic:
A flaw in rpc__mgmt_inq_stats allows attackers to retrieve memory from and crash NT4 RPC servers.

Overview:
Due to a flaw in the implementation of a standard RPC interface, attackers can retrieve large amounts of the memory from the address space of NT4 RPC servers. In addition to retrieving memory, it is possible to crash any NT4 RPC server by asking for extremely large amounts of memory, the RPC server will attempt to read from inaccessible parts of memory, causing an exception, and the termination of the RPC server.

Affected Systems:
All NT4 systems running RPC servers

Impact:
Anonymous attackers can crash any RPC server. This includes the SAM and LSA, the main RPC service, the Server service, etc. Many applications are also based on RPC or support it, including Exchange and SQL Server.

In addition to crashing servers, an attacker can read large amounts of memory from the address space of the servers. Depending on the server, this may result in the disclosure of sensitive information. For example, during testing against the LSA of an NT4 domain controller, the Administrator's password hash was retrieved.

Details:
As per the guidelines as set forth in the Organization for Internet Safety, BindView will not be releasing technical details about this flaw for 30 days. See http://www.oisafety.org/ for more details on these guidelines.

Workarounds:
None known

Recommendations:
Install the patch from Microsoft. http://www.microsoft.com/technet/security/bulletin/ms04-029.mspx

References:


CVE Name: CAN-2004-0569
The mgmt interface. http://www.opengroup.org/onlinepubs/9629399/apdxq.htm

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close