- ---------------------------------------------------------------------- Title: Unchecked Buffer in Locator Service Could Lead to Code Execution (810833) Date: 22 January, 2003 Software: Microsoft Windows NT 4.0, Windows 2000, and Windows XP Impact: Run code of the attacker's choice Max Risk: Critical Bulletin: MS03-001 Microsoft encourages customers to review the Security Bulletins at: http://www.microsoft.com/technet/security/bulletin/ms03-001.asp http://www.microsoft.com/security/security_bulletins/ms03-001.asp - ---------------------------------------------------------------------- Issue: ====== The Microsoft Locator service is a name service that maps logical names to network-specific names. It ships with Windows NT 4.0, Windows 2000, and Windows XP. By default, the Locator service is enabled only on Windows 2000 domain controllers and Windows NT 4.0 domain controllers; it is not enabled on Windows NT 4.0 workstations or member servers, Windows 2000 workstations or member servers, or Windows XP. A security vulnerability results from an unchecked buffer in the Locator service. By sending a specially malformed request to the Locator service, an attacker could cause the Locator service to fail, or to run code of the attacker's choice on the system. Mitigating Factors: ==================== - The Locator service is not enabled by default on any affected versions of Windows with the exception of Windows 2000 domain controllers and Windows NT 4.0 domain controllers. - A properly-configured firewall would block the calls to the Locator service, which would protect an affected machine from an Internet-based attack. Risk Rating: ============ - Windows NT 4.0 (Workstations and Member Servers): Moderate - Windows NT 4.0 (Domain Controllers Only): Critical - Windows NT 4.0, Terminal Server Edition: Moderate - Windows 2000 (Workstations and Member Servers): Moderate - Windows 2000 (Domain Controllers Only): Critical - Windows XP: Moderate Patch Availability: =================== - A patch is available to fix this vulnerability. Please read the Security Bulletins at http://www.microsoft.com/technet/security/bulletin/ms03-001.asp http://www.microsoft.com/security/security_bulletins/ms03-001.asp for information on obtaining this patch. Acknowledgment: =============== - David Litchfield of Next Generation Security Software Ltd. (http://www.nextgenss.com) - --------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. *******************************************************************