-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2006.0456 -- [Win]
MS06-035 Vulnerability in Server Service Could Allow Remote Code Execution
                               12 July 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Server service
Publisher:            Microsoft
Operating System:     Windows Server 2003 x64 Edition
                      Windows Server 2003 Itanium SP1
                      Windows Server 2003 Itanium
                      Windows Server 2003 SP1
                      Windows Server 2003
                      Windows XP Professional x64 Edition
                      Windows XP SP1 and SP2
                      Windows 2000 SP 4
Impact:               Execute Arbitrary Code/Commands
                      Access Privileged Data
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-1315 CVE-2006-1314

Original Bulletin:
    http://www.microsoft.com/technet/security/Bulletin/MS06-035.mspx

Comment: This bulletin refers to two separate vulnerabilities. The more
         serious of the two may allow the remote execution of arbitrary
         code. The other is an information disclosure vulnerability. Note
         that both of these vulnerabilities are fixed by the patch.

- --------------------------BEGIN INCLUDED TEXT--------------------

MS06-035 Vulnerability in Server Service Could Allow Remote Code Execution
CVE-2006-1315 CVE-2006-1314

Affected Software:
   - Microsoft Windows 2000 Service Pack 4
   - Microsoft Windows XP Service Pack 1
   - Microsoft Windows XP Service Pack 2
   - Microsoft Windows XP Professional x64 Edition 
   - Microsoft Windows Server 2003
   - Microsoft Windows Server 2003 Service Pack 1
   - Microsoft Windows Server 2003 for Itanium-based Systems
   - Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
   - Microsoft Windows Server 2003 x64 Edition

Non-Affected Software:
   - Microsoft Windows 98
   - Microsoft Windows 98 Second Edition (SE)
   - Microsoft Windows Millennium Edition (Me)

CVE-2006-1314 - Mailslot Heap Overflow Vulnerability
====================================================
There is a remote code execution vulnerability in the Server driver that
could allow an attacker who successfully exploited this vulnerability to
take complete control of the affected system.
	
Mitigating Factors
- ------------------
Firewall best practices and standard default firewall configurations can
help protect networks from attacks that originate outside the enterprise
perimeter. Best practices recommend that systems that are connected to the
Internet have a minimal number of ports exposed.

Microsoft Windows XP Service Pack 2 and Microsoft Windows Server 2003
Service Pack 1 do not have services listening on Mailslots in default
configurations.

Attempts to exploit this vulnerability will most probably result in a
Denial of Service condition caused by an unexpected restart of the
affected system rather than Remote Code Execution.

Workarounds
- -----------
Microsoft has tested the following workarounds. Although these workarounds
will not correct the underlying vulnerability, they help block known attack
vectors.

 - Block TCP port 445 at the firewall:
   This port is used to initiate a connection with the affected component.
   Blocking TCP port 445 at the firewall will help protect systems that are
   behind that firewall from attempts to exploit this vulnerability. We
   recommend that you block all unsolicited inbound communication from the
   Internet to help prevent attacks that may use other ports.
	
 - To help protect from network-based attempts to exploit this vulnerability,
   use a personal firewall, such as the Internet Connection Firewall, which
   is included with Windows XP and with Windows Server 2003.

   By default, the Internet Connection Firewall feature in Windows XP and in
   Windows Server 2003 helps protect your Internet connection by blocking
   unsolicited incoming traffic. We recommend that you block all unsolicited
   incoming communication from the Internet. In Windows XP Service Pack 2
   this features is called the Windows Firewall.

   To enable the Internet Connection Firewall feature by using the Network
   Setup Wizard, follow these steps:

   1. Click Start, and then click Control Panel.

   2. In the default Category View, click Network and Internet Connections,
      and then click Setup or change your home or small office network. The
      Internet Connection Firewall feature is enabled when you select a
      configuration in the Network Setup Wizard that indicates that your
      system is connected directly to the Internet.

   To configure Internet Connection Firewall manually for a connection,
   follow these steps:

   1. Click Start, and then click Control Panel.

   2. In the default Category View, click Networking and Internet
      Connections, and then click Network Connections.

   3. Right-click the connection on which you want to enable Internet
      Connection Firewall, and then click Properties.

   4. Click the Advanced tab.

   5. Click to select the Protect my computer or network by limiting or
      preventing access to this computer from the Internet check box, and
      then click OK.

   Note: If you want to enable certain programs and services to communicate
         through the firewall, click Settings on the Advanced tab, and then
         select the programs, the protocols, and the services that are
         required.

 - To help protect from network-based attempts to exploit this vulnerability,
   enable advanced TCP/IP filtering on systems that support this feature.

   You can enable advanced TCP/IP filtering to block all unsolicited inbound
   traffic. For more information about how to configure TCP/IP filtering,
   see Microsoft Knowledge Base Article 309798.

 - To help protect from network-based attempts to exploit this vulnerability,
   block the affected ports by using IPSec on the affected systems.

   Use Internet Protocol security (IPSec) to help protect network
   communications. Detailed information about IPSec and about how to apply
   filters is available in Microsoft Knowledge Base Article 313190 and
   Microsoft Knowledge Base Article 813878.

CVE-2006-1315 - SMB Information Disclosure Vulnerability
========================================================
There is an information disclosure vulnerability in the Server service that
could allow an attacker to view fragments of memory used to store SMB
traffic during transport.
	
Mitigating Factors
- ------------------
Firewall best practices and standard default firewall configurations can
help protect networks from attacks that originate outside the enterprise
perimeter. Best practices recommend that systems that are connected to the
Internet have a minimal number of ports exposed.

For customers who require the affected component, firewall best practices
and standard default firewall configurations can help protect networks from
attacks that originate outside the enterprise perimeter. Best practices
recommend that systems that are connected to the Internet have a minimal
number of ports exposed.

On Windows 2000, Windows XP Service Pack 1, and Windows Server 2003, an
attacker must have valid logon credentials to exploit this vulnerability.
The vulnerability could not exploited by anonymous users. However, the
affected component is available remotely to users who have standard user
accounts. In certain configurations, anonymous users could authenticate as
the Guest account. For more information, see Microsoft Security Advisory
906574.

Firewall best practices and standard default firewall configurations can help
protect networks from attacks that originate outside the enterprise perimeter.
Best practices recommend that systems that are connected to the Internet have
a minimal number of ports exposed.
	
Workarounds
- -----------
Microsoft has tested the following workarounds. Although these workarounds
will not correct the underlying vulnerability, they help block known attack
vectors.

Note: Other protocols such as Internetwork Packet Exchange (IPX) and
Sequenced Packet Exchange (SPX) could be vulnerable to this issue. If
vulnerable protocols such as IPX and SPX are in use, it is important to
block the appropriate ports for those protocols as well.

 - Block TCP ports 139 and 445 at the firewall
   These ports are used to initiate a connection with the affected protocol.
   Blocking them at the firewall, both inbound and outbound, will help prevent
   systems that are behind that firewall from attempts to exploit this
   vulnerability. We recommend that you block all unsolicited inbound
   communication from the Internet to help prevent attacks that may use other
   ports.

 - To help protect from network-based attempts to exploit this vulnerability,
   use a personal firewall, such as the Internet Connection Firewall, which
   is included with Windows XP and with Windows Server 2003.

   By default, the Internet Connection Firewall feature in Windows XP and in
   Windows Server 2003 helps protect your Internet connection by blocking
   unsolicited incoming traffic. We recommend that you block all unsolicited
   incoming communication from the Internet.

   To enable the Internet Connection Firewall feature by using the Network
   Setup Wizard, follow these steps:

   1. Click Start, and then click Control Panel.

   2. In the default Category View, click Network and Internet Connections,
      and then click Setup or change your home or small office network. The
      Internet Connection Firewall feature is enabled when you select a
      configuration in the Network Setup Wizard that indicates that your
      system is connected directly to the Internet.

   To configure Internet Connection Firewall manually for a connection,
   follow these steps:

   1. Click Start, and then click Control Panel.

   2. In the default Category View, click Networking and Internet
      Connections, and then click Network Connections.

   3. Right-click the connection on which you want to enable Internet
      Connection Firewall, and then click Properties.

   4. Click the Advanced tab.

   5. Click to select the Protect my computer or network by limiting or
      preventing access to this computer from the Internet check box, and
      then click OK.

   Note: If you want to enable certain programs and services to communicate
         through the firewall, click Settings on the Advanced tab, and then
         select the programs, the protocols, and the services that are
         required.

 - To help protect from network-based attempts to exploit this vulnerability,
   enable advanced TCP/IP filtering on systems that support this feature.

   You can enable advanced TCP/IP filtering to block all unsolicited inbound
   traffic. For more information about how to configure TCP/IP filtering,
   see Microsoft Knowledge Base Article 309798.

 - To help protect from network-based attempts to exploit this vulnerability,
   block the affected ports by using IPSec on the affected systems.

   Use Internet Protocol security (IPSec) to help protect network
   communications. Detailed information about IPSec and about how to apply
   filters is available in Microsoft Knowledge Base Article 313190 and
   Microsoft Knowledge Base Article 813878.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRLRynCh9+71yA2DNAQIEsQP8DXaOV6IahKciPBYUQo/OdcVzFmanoHd7
wuQBUmdXkA9CBzcYWZFrvK+77vWAIyM+u2k2z644n2OK9F0XkRVAZ4lJjCpd40vy
roT5DAy3IwWTBGifPITqnQWiaaqt0FZi7+2YhZ2CDL2AglJNjl+2qHxp59yftDSj
7ysY4d/BfuM=
=NJ70
-----END PGP SIGNATURE-----