copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AL-2003.20 -- Microsoft RPC Race Condition Denial of Service

Date: 15 October 2003
References: AU-2003.014  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
A  U  S  C  E  R  T                                           A  L  E  R  T

                        AL-2003.20 -- AUSCERT ALERT
              Microsoft RPC Race Condition Denial of Service
                            ISS Security Brief
                              15 October 2003
===========================================================================

        AusCERT Alert Summary
        ---------------------

Product:                Distributed Component Object Model (DCOM) / 
                        Remote Procedure Call (RPC) Service
Publisher:              Internet Security Systems (ISS) X-Force
Operating System:       Windows XP
                        Windows 2000
Impact:                 Denial of Service
Access Required:        Remote

Ref:                    AL-2003.15
                        AL-2003.11
                        AU-2003.014

Another vulnerability has been discovered in Microsoft RPC (DCOM)
services which is not patched by MS03-026 or MS03-039. Publicly available
exploit code, which expands upon that described in AU-2003.014 (see
Ref:), has been released which exploits this vulnerability causing a
denial of service on Windows XP and 2000 systems patched with MS03-026 or
MS03-039. The same exploit code will compromise systems that have not
been updated with MS03-026 and MS03-039 patches.

Until patches are available for this new vulnerability, the following
workarounds can be used to reduce possible attack exposure. These
workarounds may have an adverse affect network and application operations
and as such should be researched and tested before making changes to
production systems.

o Use a network or host-based/personal firewalls, block RPC network
  traffic (ports 135/tcp, 139/tcp, 445/tcp, 593/tcp and 135/udp,
  137/udp, 138/udp, 445/udp).

o Disable COM Internet Services (CIS) and RPC over HTTP as per
  Microsoft Knowledge Base Article 825819:

    http://support.microsoft.com/default.aspx?scid=825819

o Disable DCOM as detailed in Microsoft Knowledge Base Article 825750:

    http://support.microsoft.com/default.aspx?scid=825750

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Brief
October 14, 2003

Microsoft RPC Race Condition Denial of Service

Synopsis:

ISS X-Force has discovered a flaw in the Microsoft RPC service during a
routine audit that may allow remote attackers to trigger a Denial of
Service (DoS) condition on vulnerable hosts. This vulnerability exists in
the most current patch-levels of the Windows operating systems, including
computers patched against the issues described in Microsoft Security
Bulletin MS03-039. This vulnerability has been reported by various sources
as a new exploit vector against the vulnerability disclosed in MS03-039.
This assessment is incorrect. The vulnerability described in this Advisory
manifests as a result of a separate multi-threaded race condition when
processing incoming RPC requests.

Impact:

X-Force has demonstrated that a DoS vulnerability exists by exploiting the
race condition. Attackers can take advantage of this vulnerability by
crashing the Microsoft RPC service, and/or forcing vulnerable systems to
reboot. X-Force has not demonstrated that this vulnerability can be used
to execute arbitrary code or to compromise a vulnerable system.
Significant  barriers exist which may prevent reliable exploitation
outside of controlled lab conditions.

Affected Versions:

Microsoft Windows 2000
Microsoft Windows XP

For the complete ISS X-Force Security Advisory, please visit: 
http://xforce.iss.net/xforce/alerts/id/155

______ 

About Internet Security Systems (ISS) 
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a 
pioneer and world leader in software and services that protect critical 
online resources from an ever-changing spectrum of threats and misuse. 
Internet Security Systems is headquartered in Atlanta, GA, with 
additional operations throughout the Americas, Asia, Australia, Europe 
and the Middle East. 

Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved 
worldwide. 

Permission is hereby granted for the electronic redistribution of this 
document. It is not to be edited or altered in any way without the 
express written consent of the Internet Security Systems X-Force. If you 
wish to reprint the whole or any part of this document in any other 
medium excluding electronic media, please email xforce@iss.net for 
permission. 

Disclaimer: The information within this paper may change without notice. 
Use of this information constitutes acceptance for use in an AS IS 
condition. There are NO warranties, implied or otherwise, with regard to 
this information or its use. Any use of this information is at the 
user's risk. In no event shall the author/distributor (Internet Security 
Systems X-Force) be held liable for any damages whatsoever arising out 
of or in connection with the use or spread of this information. 
X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, 
as well as at http://www.iss.net/security_center/sensitive.php 
Please send suggestions, updates, and comments to: X-Force 
xforce@iss.net of Internet Security Systems, Inc. 

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBP4xASjRfJiV99eG9AQFKPgP/SBfoVnOM1Vzg8mteT4sq80FzH7YdlkhL
v5Sd7b9w7wUF1/FCWRTN1yDSWEk7Yo3BstSjvmqFMFd6zOtD+RLqVB/9CROj2Cr7
7P03Jr2/zcS3YDbRwhGB0gfkv2ysxdnWLx4pKnheCtMYkOzCALxpLcqI5W/1gimO
SoCs4qyPhoI=
=k2ZS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This alert is provided as a service to AusCERT's members.  As AusCERT did
not write the document quoted above, AusCERT has had no control over its   
content. The decision to follow or act on information or advice contained in
this security bulletin is the responsibility of each user or organisation, and 
should be considered in accordance with your organisation's site policies and 
procedures. AusCERT takes no responsibility for consequences which may arise 
from following or acting on information or advice contained in this security 
bulletin.

NOTE: This is only the original release of the alert.  It may not be
updated when updates to the original are made.  If downloading at a later
date, it is recommended that the alert is retrieved directly from the
author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the alert above.  If you have any questions or need further information,
please contact them directly.

Previous advisories, alerts and external security bulletins can be 
retrieved from:

        http://www.auscert.org.au/render.html?cid=1977

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business
                hours which are GMT+10:00 (AEST).  On call after hours
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBP4yKCSh9+71yA2DNAQEeTwQAl3V56BECBPTv8KFrxCk7PQvvfqBqRHz7
GQIz6agaBBBkQxpcON2n25k5cj4gy+mhzxHLfV8UuXrcYmUFCwO1L6GFz4a+jsWT
rMV6t61CqnSWfXwiMQ6sWdVIrQrrH6NUL8QQPzk4zo7FRwRDv3SgjCbqO2OMgrAK
6hIpoPUTgtI=
=nfgT
-----END PGP SIGNATURE-----