10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.819 High
EPSS
Percentile
98.4%
A vulnerability in Windows Active Directory could allow a remote attacker to execute arbitrary code on a vulnerable system.
The Lightweight Directory Access Protocol (LDAP) is a standard protocol that enables users to query or modify the data in a meta directory. Microsoft’s Active Directory is a directory service provided with Windows 2000 Server and Windows 2003 Server that stores information about objects on a network and makes this information available to users and network administrators. LDAP is the primary access protocol for Windows Active Directory.
The LDAP service provided with these systems fails to perform sufficient checks for the number of convertible attributes included in a LDAP request. This vulnerability could be exploited by a remote attacker with the ability to supply a specially crafted packet to the affected system. Microsoft states that the attacker would not need to be authenticated to exploit this vulnerability on an affected Windows 2000 Server system while the attacker must have valid authentication credentials to exploit this vulnerability on an affected Windows Server 2003 system.
A remote attacker may be to execute arbitrary code on an affected system or cause the Active Directory service to crash, resulting in a denial of service.
Apply a patch from the vendor
Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.
Workarounds
In addition to the patches referred to above, Microsoft Security Bulletin MS07-039 also contains several workarounds for this issue. Users, particularly those who are unable to apply the patches are encouraged to implement these workarounds.
487905
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 10, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23487905 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Neel Mehta of IBM Internet Security Systems X-Force, for reporting this issue to them.
This document was written by Chad R Dougherty.
CVE IDs: | CVE-2007-0040 |
---|---|
Severity Metric: | 12.66 Date Public: |