copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
» ESB-2002.698 -- Microsoft Security Bulletin MS02-070...
ESB-2002.698 -- Microsoft Security Bulletin MS02-070 -- Flaw in SMB Signing Could Enable Group Policy to be Modified (309376)
Date:
13 December 2002
References
:
ESB-2003.0048
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.698 -- Microsoft Security Bulletin MS02-070 Flaw in SMB Signing Could Enable Group Policy to be Modified (309376) 13 December 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Windows 2000 Windows XP Vendor: Microsoft Impact: Administrator Compromise Execute Arbitrary Code/Commands Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ---------------------------------------------------------------------- Title: Flaw in SMB Signing Could Enable Group Policy to be Modified (309376) Date: 11 December 2002 Software: Windows 2000, Windows XP Impact: Modify group policy Max Risk: Moderate Bulletin: MS02-070 Microsoft encourages customers to review the Security Bulletins at: http://www.microsoft.com/technet/security/bulletin/MS02-070.asp http://www.microsoft.com/security/security_bulletins/ms02-070.asp. - - ---------------------------------------------------------------------- Issue: ====== Server Message Block (SMB) is a protocol natively supported by all versions of Windows. Although nominally a file-sharing protocol, it is used for other purposes as well, the most important of which is disseminating group policy information from domain controllers to newly logged on systems. Beginning with Windows 2000, it is possible to improve the integrity of SMB sessions by digitally signing all packets in a session. Windows 2000 and Windows XP can be configured to always sign, never sign, or sign only if the other party requires it. A flaw in the implementation of SMB Signing in Windows 2000 and Windows XP could enable an attacker to silently downgrade the SMB Signing settings on an affected system. To do this, the attacker would need access to the session negotiation data as it was exchanged between a client and server, and would need to modify the data in a way that exploits the flaw. This would cause either or both systems to send unsigned data regardless of the signing policy the administrator had set. After having downgraded the signing setting, the attacker could continue to monitor the session and change data within it; the lack of signing would prevent the communicants from detecting the changes. Although this vulnerability could be exploited to expose any SMB session to tampering, the most serious case would involve changing group policy information as it was being disseminated from a Windows 2000 domain controller to a newly logged-on network client. By doing this, the attacker could take actions such as adding users to the local Administrators group or installing and running code of his or her choice on the system. Mitigating Factors: ==================== - A fix for this issue is already included in Windows XP Service Pack 1. - Exploiting the vulnerability would require the attacker to have significant network access already. In most cases, the attacker would need to be located on the same network segment as one of the two participants in the SMB session. - The attacker would need to exploit the vulnerability separately for each SMB session he or she wanted to interfere with. - The vulnerability would not enable the attacker to change group policy on the domain controller, only to change it as it flowed to the client. - SMB Signing is disabled by default on Windows 2000 and Windows XP because of the performance penalty it exacts. On networks where SMB Signing has not been enabled, the vulnerability would pose no additional risk - because SMB data would already be vulnerable to modification. Risk Rating: ============ - Windows 2000: Moderate - Windows XP: Low - Windows XP Service Pack 1: None Patch Availability: =================== - A patch is available to fix this vulnerability. Please read the Security Bulletin at http://www.microsoft.com/technet/security/bulletin/ms02-070.asp for information on obtaining this patch. - - --------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. - -----BEGIN PGP SIGNATURE----- Version: PGP 7.1 iQEVAwUBPfeslI0ZSRQxA/UrAQEG5Af/WQf7JMmFg0tRH328X2kdNRrgmGyGO6iv XCn3lSNxZVhhJpSoIOPdb4vkc19vWHPx+UxWtesX9v7so9avlWvZYBkDJLr6587N /f5sTbKx0ZdH22AKW+zDJ7LgHeeq1VOasTXP1FKQnFWFAGUivZdkhEZjmvQfSaqK jsXWJ1IJuZGkGAv8enE7/Ka2FFDBnZHoMwRGC5kapSDLwF8AW04fkDXl0rSE24hO oII1DUFTNB+12vZvrqXG9SYuEf+uTiVmuE/9cU+X9NLH+5MAH1qdl0OnCEfpKYEG fuHvlXTKC7ZpWQGMmoUoqq6c7HeWywKrT9WYkeo2mnWZLviE+U5peA== =6oW0 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author\'s website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBPfnEfih9+71yA2DNAQEVWgP/dGw2NUqhhiuvyKKnSR3rdYTRNUCE8sGw oq9Qh1Af+ta5U+4scfnM7ZaBgsuwFe+xqmD4AjHYIrcoRtOG1WvwXgQwSud/9uF2 g1GeKWdUM9/aeIY11FjhZlxInHh5Fjcd8SvA2YJrloVtWKRj3nhC9oW9Vsw4g/4j CeauifUENw4= =VEnk -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1&it=2631