VID |
26160 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The remote host is vulnerable to a MSRPC SVCCTL Service Enumeration vulnerability. Microsoft Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes (srvsvc instead of svcctl), which allows a remote attacker to enumerate installed or running services on an affected computer. A remote attacker can invoke the svcctl Microsoft RPC interface to connect to the Service Control Manager and determine which servers are installed or currently running on the targeted system. It may also be possible to start or stop Windows services by exploiting this flaw.
* References: http://support.microsoft.com/kb/891861 http://www.hsc.fr/ressources/presentations/null_sessions/msrpc_null_sessions.pdf http://support.microsoft.com/kb/842209 http://www.securitytracker.com/alerts/2005/Jul/1014417.html http://securityfocus.com/archive/1/404547
* Platforms Affected: Microsoft Windows NT 4.0 SP6a Microsoft Windows 2000 SP4 |
Recommendation |
For Microsoft Windows 2000: Apply the Update Rollup Package 1 (KB891861), as listed in Microsoft Knowledge Base Article - 891861 at http://support.microsoft.com/kb/891861
-- OR --
As a workaround, modify specific registry entries and configuration options as listed in Microsoft Knowledge Base Article 842209 at http://support.microsoft.com/kb/842209 |
Related URL |
CVE-2005-2150 (CVE) |
Related URL |
14093,14177 (SecurityFocus) |
Related URL |
21286 (ISS) |
|