Flaw leaves Windows open to DoS attacks

Discussion in 'other security issues & news' started by Smokey, Nov 2, 2002.

Thread Status:
Not open for further replies.
  1. Smokey

    Smokey Registered Member

    Joined:
    Apr 1, 2002
    Posts:
    1,514
    Location:
    Annie's Pub
    October 31, 2002 5:30 am PT

    A FLAW IN software code that implements a protocol for VPNs (virtual private networks) makes Windows 2000 and Windows XP systems vulnerable to DoS (denial-of-service) attacks, Microsoft warned late Wednesday.

    An unchecked buffer exists in the code that implements the PPTP (Point-to-Point Tunneling Protocol), a protocol that enables users to create and use VPNs that is natively supported by Windows 2000 and Windows XP, Microsoft said in security bulletin MS02-063. The software maker deems the issue "critical." (http://www.microsoft.com/technet/security/bulletin/MS02-063.asp)

    PPTP is an option in Routing and Remote Access Services in server versions of Windows 2000 and Windows XP, and part of the Remote Access Client in workstation versions. Systems are only at risk if PPTP has been enabled, Microsoft said.

    Both server and client systems are at risk, though an attack on a client would be more difficult as it typically changes its IP address every time a connection is set up, Microsoft said. An attacker could cause a vulnerable system to fail by sending malformed PPTP control data to the system, Microsoft said.

    A patch to fix the problem is available from Microsoft's TechNet Web site. Administrators offering PPTP services should install it immediately, and users of remote access using PPTP should consider installing the patch, the Redmond, Washington, software maker said.

    Microsoft warned of another, "moderate," security issue affecting Windows 2000 in a separate security bulletin issued Wednesday. (http://www.microsoft.com/technet/security/bulletin/MS02-064.asp)

    The default permission settings for the software provide users in the "Everyone" group full access to the system root folder. An attacker could mount a Trojan horse attack against users on the same system by placing a program in the root and having that run when another user signs on, Microsoft said. Administrators should consider changing access permissions on the Windows 2000 root directory, Microsoft said.

    Original article at: http://iwsun3.infoworld.com/articles/hn/xml/02/10/31/021031hnwindowsflaw.xml?s=IDGNS
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.