Lucene search

K
certCERTVU:487905
HistoryJul 10, 2007 - 12:00 a.m.

Microsoft Windows Active Directory fails to properly validate LDAP requests

2007-07-1000:00:00
www.kb.cert.org
15

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.819 High

EPSS

Percentile

98.4%

Overview

A vulnerability in Windows Active Directory could allow a remote attacker to execute arbitrary code on a vulnerable system.

Description

The Lightweight Directory Access Protocol (LDAP) is a standard protocol that enables users to query or modify the data in a meta directory. Microsoft’s Active Directory is a directory service provided with Windows 2000 Server and Windows 2003 Server that stores information about objects on a network and makes this information available to users and network administrators. LDAP is the primary access protocol for Windows Active Directory.

The LDAP service provided with these systems fails to perform sufficient checks for the number of convertible attributes included in a LDAP request. This vulnerability could be exploited by a remote attacker with the ability to supply a specially crafted packet to the affected system. Microsoft states that the attacker would not need to be authenticated to exploit this vulnerability on an affected Windows 2000 Server system while the attacker must have valid authentication credentials to exploit this vulnerability on an affected Windows Server 2003 system.


Impact

A remote attacker may be to execute arbitrary code on an affected system or cause the Active Directory service to crash, resulting in a denial of service.


Solution

Apply a patch from the vendor
Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.


Workarounds
In addition to the patches referred to above, Microsoft Security Bulletin MS07-039 also contains several workarounds for this issue. Users, particularly those who are unable to apply the patches are encouraged to implement these workarounds.


Vendor Information

487905

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: July 10, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23487905 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Neel Mehta of IBM Internet Security Systems X-Force, for reporting this issue to them.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2007-0040
Severity Metric: 12.66 Date Public:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.819 High

EPSS

Percentile

98.4%