Lucene search

K
certCERTVU:570330
HistoryAug 15, 2001 - 12:00 a.m.

MS Windows NT Terminal Server 4.0 buffer overflow in regapi.dll allows remote code execution or DoS

2001-08-1500:00:00
www.kb.cert.org
34

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.9%

Overview

Microsoft Windows NT 4.0 Terminal Server contains a buffer overflow that could allow an intruder to execute arbitrary code with the privileges of an administrator.

Description

There is a buffer overflow in the code that processes the username (specifically in RegAPI.DLL) in Microsoft Windows NT 4.0 Terminal Server. This allows an intruder to submit a specially crafted username in such a way as to cause Terminal Server to execute code of the intruder’s choosing. The intruder does not need to have a valid username or password; anyone with access to port 3389/TCP can exploit this vulnerability.


Impact

Intruders can execute arbitrary code with the privileges of a logged in administrator. Additionally, an intruder who can log in locally can cause Terminal Server to crash.


Solution

Apply a patch as described in <http://www.microsoft.com/ntserver/terminalserver/downloads/critical/q277910/default.asp&gt;.


You may also with to block access to port 3389/TCP to reduce your exposure to this vulnerability. This does not eliminate the vulnerability, but it does reduce the number of people who can exploit it.


Vendor Information

570330

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft __ Affected

Updated: August 15, 2001

Status

Affected

Vendor Statement

See <http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms00-087.asp&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23570330 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Bruno Acselrad of CORE SDI S.A., Buenos Aires, Argentina.

This document was written by Shawn V. Hernan.

Other Information

CVE IDs: CVE-2000-1149
Severity Metric: 16.88 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.9%

Related for VU:570330