| VID |
12003 |
| Severity |
40 |
| Port |
139 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Windows platform has a denial of service vulnerability in Network Share Provider. Microsoft Server Message Block (SMB) is a protocol for sharing data and resources between computers. Buffer overflow in SMB protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows an attacker to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3. The attacker could use both a user account and anonymous access to accomplish this. Though not confirmed, it may be possible to execute arbitrary code.
Platforms Affected: - Windows NT 4.0 Workstation/Server - Windows 2000 Professional/Advanced Server - Windows XP Professional
* Note: The target windows system seems to be crashed and restarted by this test.
* References: http://www.microsoft.com/technet/security/bulletin/ms02-045.asp http://www.corest.com/common/showdoc.php?idx=262&idxseccion=10 |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS02-037, http://www.microsoft.com/technet/security/bulletin/ms02-045.asp
As workarounds: - Disable anonymous access (NULL connections) This will not prevent legitimate users from abusing the vulnerability.
- Block access to the SMB ports from untrusted networks. Blocking access to ports tcp/445 and tcp/139 at the network perimeter will prevent attacks from untrusted parties. However, this is not a viable solution for environment were file and printing services are needed for legitimate users.
- Shutdown the Lanman server (net stop lanmanserver) This prevents exploitation from any attacker but removes all file and print sharing functionality from the vulnerable server. It might not be a viable solution in many environments. |
| Related URL |
CVE-2002-0724 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|