Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Microsoft Confirms Windows Flaw, Exploit

    Written by

    Ryan Naraine
    Published November 17, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft late Wednesday confirmed a denial-of-service flaw in its implementation of the RPC (Remote Procedure Call) protocol and warned users that a working exploit is already publicly available.

      Microsoft Corp. countered the public disclosure of the vulnerability with an advisory that clarify the scope of the impact and to provide pre-patch workaround for Windows users.

      Microsoft advisory comes a few days after the proof-of-concept exploit code appeared on several security Web sites, including SecuriTeam.com, FrSIRT.com and Virus.org.

      Microsoft acknowledged the bug affected its Windows 2000 Service Pack 4 and Windows XP Service Pack 1 operating systems. “This vulnerability could allow an attacker to levy a denial of service attack of limited duration,” the companys advisory warned.

      Windows XP Service Pack 2 and Windows Server 2003 (with SP1) are unaffected.

      /zimages/3/28571.gifClick here to read more about how a worm exploits RPC flaw in Windows.

      On Windows XP Service Pack 1, a successful exploit requires that the attacker have valid logon credentials. Microsoft insists the vulnerability cannot be exploited remotely by anonymous users but noted than an affected component is available remotely to users who have standard user accounts.

      Even as Microsoft is downplaying the extent of the flaw, security experts are debating whether theres more than just a simple RPC implementation issue.

      “This bug is much wider scoped than most people realize, a friend of mine found it when writing his muddle implementation a few months ago. You can trigger it about 12 different ways on Win2000 and at least 2 different ways on XP,” said H.D. Moore, creator of the Metasploit Project.

      In a message posted on the Daily Dave mailing list, Moore described the bug as “pretty silly” and warned that it can be used to exploit out-of-memory conditions in other services. Moore also suggested there are attack vectors in a function in the “Server” service on Windows XP SP2.

      /zimages/3/28571.gifClick here to read more about Melissa to Zotob: 10 years of Windows worms.

      Any flaw in Microsofts implementation of RPC is bound to raise eyebrows. The RPC protocol is used in Windows to provide an inter-process communication mechanism that allows a program that is running on one computer to seamlessly access services on another computer.

      It was an RPC-related vulnerability that was exploited in the widespread Blaster worm in 2003.

      This time around, Microsoft maintains the risk is simply a “denial of service condition of limited duration.”

      Workarounds:

      To help protect against anonymous network-based connection attempts to exploit the flaw, Microsoft suggests that users configure the RestrictAnonymous registry setting to a more restrictive setting.

      Additionally, users can block UDP ports 135, 137, 138, and 445, and TCP ports 135, 139, 445, and 593. All unsolicited inbound traffic on ports greater than 1024 and any other specifically configured RPC port should be blocked.

      If installed, COM Internet Services (CIS) or RPC over HTTP, which listen on ports 80 and 443 should also be blocked to avoid a potential attack.

      Detailed instructions on port blocking can be found Microsofts advisory.

      /zimages/3/28571.gifCheck out eWEEK.coms for Microsoft and Windows news, views and analysis.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.