Korean
<< Back
VID 26064
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix(KB828035) for the 'Buffer Overflow in Messenger Service' has not been applied. The "Messenger Service" is enabled by default on all Windows NT, Windows 2000, and Windows XP desktops and servers. The Microsoft Messenger Service is unrelated to Microsoft MSN Messenger. The vulnerability results because the Messenger Service does not properly validate the length of a message before passing it to the allocated buffer. A remote attacker who successfully exploited this vulnerability could be able to run code with Local System privileges on an affected system, or could cause the Messenger Service to fail.
Similarly to the MS-RPC vulnerability (as described in Microsoft Security Bulletin MS03-026), the Messenger Service is also reachable via MS-RPC (Microsoft Remote Procedure Call). Vulnerabilities of this nature have led to Internet worms such as "MS Blast/Blaster", "Nachi", and "SQL Slammer".

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms03-043.asp
http://xforce.iss.net/xforce/alerts/id/156

* Platforms Affected:
Microsoft Windows NT Workstation 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6
Microsoft Windows 2000, Service Pack 2
Microsoft Windows 2000, Service Pack 3, Service Pack 4
Microsoft Windows XP Gold, Service Pack 1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-bit Edition
Recommendation Disable the Messenger Service, if it is not required. To disable the Messenger Service, follow the instructions below:

1. Navigate to the "Start" Menu, and then to the "Control Panel".
2. Depending on system type and configuration, navigate either to the "Performance and Maintenance" menu, or the "Administrative Tools" menu.
3. Navigate to the "System" menu.
4. Click on the "Services" icon.
5. Windows will present a list of system services. Scroll down to the service named "Messenger". Right-click on this service and select "Properties" from the popup menu.
6. Use to dialog box next to "Startup Type", select "Disabled".
7. Under the "Service Status" sub-menu click the button labeled, "Stop".
8. Click the "Apply" and "Ok" buttons. The service has now been stopped and disabled.

-- OR --

Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS03-043 at http://www.microsoft.com/technet/security/bulletin/ms03-043.asp

1. Open the following page to download the patch:
For Microsoft Windows NT Workstation 4.0, Service Pack 6a:
http://www.microsoft.com/downloads/details.aspx?FamilyId=7597FCF4-6615-4074-9E46-A17D808ED38D
For Microsoft Windows NT Server 4.0, Service Pack 6a:
http://www.microsoft.com/downloads/details.aspx?FamilyId=B1949456-996A-485A-9A28-79FD79F26A1B
For Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6:
http://www.microsoft.com/downloads/details.aspx?FamilyId=64AB4B66-1A6E-4264-93A8-26CDB98B05A8
For Microsoft Windows 2000, Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=A0061377-1683-4C13-9527-5534F6C7CF85
For Microsoft Windows 2000, Service Pack 3, Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=99F1B40D-906A-4945-A021-4B494CCCBDE0
For Microsoft Windows XP Gold, Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=F02DA309-4B0A-4438-A0B9-5B67414C3833
For Microsoft Windows XP 64-bit Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=2BE95254-4C65-4CA5-80A5-55FDF5AA2296
For Microsoft Windows XP 64-bit Edition Version 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=8B990946-84C8-4C91-899C-5A44EC13174E
For Microsoft Windows Server 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1DF106F3-7EC4-4EB0-9143-C1E3C9E2F5F8
For Microsoft Windows Server 2003 64-bit Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=8B990946-84C8-4C91-899C-5A44EC13174E
2. Select a different language from the drop-down list and click <Go> button.
3. Click <Download> button to download this patch file.
4. Run this file to install the patch.
5. Restart your system to complete the installation.

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com .
Windows Update detects what version of Windows you are running and offers the appropriate patch.

The following are the typical Microsoft networking ports. All of these should be blocked as strictly as possible within firewalls (including personal firewalls):

135/tcp MS-RPC connection-oriented
135/udp MS-RPC datagrams
137/udp NetBIOS name resolution
138/udp NetBIOS/SMB datagrams
139/tcp NetBIOS/SMB connection-oriented
445/tcp SMB connection-oriented
445/udp SMB datagrams
Related URL CVE-2003-0717 (CVE)
Related URL 8826 (SecurityFocus)
Related URL 13412 (ISS)