what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2008-297A

Technical Cyber Security Alert 2008-297A
Posted Oct 23, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-297A - A vulnerability in the way the Microsoft Windows server service handles RPC requests could allow an unauthenticated, remote attacker to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2008-4250
SHA-256 | 7d9236a9b2db7f8dfc9ab0ebdc3b8a9dcc2523ab41f728fe85a2d709e1e574cd

Technical Cyber Security Alert 2008-297A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA08-297A


Microsoft Windows Server Service RPC Vulnerability

Original release date: October 23, 2008
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows 2000
* Microsoft Windows XP
* Microsoft Windows Server 2003
* Microsoft Windows Vista
* Microsoft Windows Server 2008


Overview

A vulnerability in the way the Microsoft Windows server service
handles RPC requests could allow an unauthenticated, remote
attacker to execute arbitrary code with SYSTEM privileges.


I. Description

Microsoft has released Microsoft Security Bulletin MS08-067 to
address a buffer oveflow vulnerability in the Windows Server
service. The vulnerability is caused by a flaw in the way the
Server service handles Remote Procedure Call (RPC) requests. For
systems running Windows 2000, XP, and Server 2003, a remote,
unauthenticated attacker could exploit this vulnerability. For
systems running Windows Vista and Server 2008, a remote attacker
would most likely need to authenticate.

Microsoft Security Bulletin MS08-067 rates this vulnerability as
"Critical" for Windows 2000, XP, and Server 2003. The bulletin also
notes "...limited, targeted attacks attempting to exploit the
vulnerability."

This vulnerability has been assigned CVE-2008-4250. Further
information is available in a Security Vulnerability & Research
blog entry and US-CERT Vulnerability Note VU#827267.


II. Impact

A remote, unauthenticated attacker could execute arbitrary code or
cause a vulnerable system to crash. Since the Server service runs
with SYSTEM privileges, an attacker could take complete control of
a vulnerable system.


III. Solution

Apply update

Microsoft has provided updates for this vulnerability in Microsoft
Security Bulletin MS08-067. Microsoft also provides security
updates through the Microsoft Update web site and Automatic
Updates. System administrators should consider using an automated
update distribution system such as Windows Server Update Services
(WSUS).

Disable Server and Computer Browser services

Disable the Server and Computer Browser services on Windows systems
that do not require those services. A typical Windows client that
is not sharing files or printers is unlikely to need either the
Server or Computer Browser services. As a best security practice,
disable all unnecessary services.

Restrict access to server service

Restrict access to the server service (TCP ports 139 and 445). As a
best security practice, only allow access to necessary network
services.

Filter affected RPC identifier

The host firewalls in Windows Vista and Windows Server 2008 can
selectively filter RPC Universally Unique Identifiers (UUID). See
Microsoft Security Bulletin MS08-067 for instructions to filter RPC
requests with the UUID equal to
4b324fc8-1670-01d3-1278-5a47bf6ee188.


IV. References

* US-CERT Vulnerability Note VU#827267 -
<http://www.kb.cert.org/vuls/id/827267>

* Microsoft Security Bulletin MS08-067 -
<http://www.microsoft.com/technet/security/Bulletin/
ms08-067.mspx>

* Microsoft Update - <https://update.microsoft.com/>

* Windows Update: Automatic Update
<http://www.microsoft.com/windows/downloads/windowsupdate/
automaticupdate.mspx>

* Windows Server Update Services (WSUS) Home -
<http://technet.microsoft.com/en-us/wsus/default.aspx>

* CVE-2008-4250 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250>

* More detail about MS08-067, the out-of-band netapi32.dll
security update -
<http://blogs.technet.com/swi/archive/2008/10/23/
More-detail-about-MS08-067.aspx>


____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA08-297A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-297A Feedback VU#827267" in
the subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2008 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

October 23, 2008: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSQDoMnIHljM+H4irAQJaYwgAwTlLruLijREi3IjEanhKH9DOFykxE9Mr
Mmt4yurwHjt+TPMyqgzPGuk44xd5ySPTm0qIszwIXSiIDYS50PNhg0atluiQeLVC
ToFNdd6W++75upBIQMkYUENj4GHExDcMOs0uMjlIcjqUGIERlqRHnkIWDvMU0ouc
pKnx4p50IimdVMlabHbZ1AiL1tRWFgsc0IM2FExpyVpHKXy6dCXjMbfV5pPgB23l
0CaRk5ENONr9BPDx0nN/1hwS6cQ5vaU7/i6KH1GL+hPkAAEvns002FUHPoUiaj2W
Z415eNR3psa9vDU0hsajsqySbXcgUSSW12M0FxRb2DP5HSxriXi0IQ==
=vk3f
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close