Korean
<< Back
VID 24076
Severity 40
Port 10002
Protocol TCP
Class BackDoor
Detailed Description The radmin server has been detected as running on port 10002. This probably indicates that a remote attacker exploited the GDI+ integer overflow vulnerability, described in Microsoft Security Bulletin MS04-028 with a widely available exploit. Radmin server can work as a service under all supported operating systems, which allows you to logon and logoff a user remotely as a remote administration tool. By connecting to this server and logging into the remote host, anyone could take complete control of the relevant host.

* Platforms Affected:
Microsoft Windows Any version

* References:
http://www.easynews.com/virus.txt
http://www.radmin.com/default.html
http://www.spywareguide.com/product_show.php?id=578
http://www.kb.cert.org/vuls/id/297462
http://www.ciac.org/ciac/bulletins/o-213.shtml
http://packetstormsecurity.nl/0409-advisories/ms04-028.html
http://packetstormsecurity.nl/0409-exploits/ms04-028-cmd.c
http://packetstormsecurity.nl/0409-exploits/JpegOfDeath.c
http://packetstormsecurity.nl/0409-exploits/JpgDownloader.c
http://packetstormsecurity.nl/0409-exploits/JpegOfDeathAll.c
Recommendation Remove the radmin program from the computer by using a anti-virus program (vaccine program).

-- AND --

If the MS04-028 patch has not been applied, apply the appropriate patch for your system, as listed in the Microsoft Security Bulletin MS04-028 at http://www.microsoft.com/technet/security/bulletin/MS04-028.mspx

And you also need to look for more vulnerable versions of the .dll files within your system using gdiscan.exe, available from http://isc.sans.org/gdiscan.php . If vulnerable .dll files are detected, then those files should be upgraded manually.
Related URL CVE-2004-0200 (CVE)
Related URL 1503,11173 (SecurityFocus)
Related URL 16304 (ISS)