| VID |
28056 |
| Severity |
40 |
| Port |
135,139,445,593 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Windows system is vulnerable to a buffer overflow vulnerability(2) in RPC DCOM Interface. This vulnerability doesn't arise due to the same flaw as the one described in Microsoft Security Bulletin MS03-026 which fixes the flaw exploited by the 'MSBlast' (or Welchia, Nachi, LoveSan) worm. This is similar in nature and scope as the flaw described in MS03-026. Remote Procedure Call (RPC) is a protocol used by the Windows operating system, which provides an inter-process communication mechanism that allows a program running on one computer to seamlessly execute code on a remote system. However, there is a buffer overflow vulnerability that can be exploited remotely via a DCOM RPC interface that listens on TCP/UDP port 135. The vulnerability results because the Windows RPC service does not properly check message inputs under certain circumstances. To exploit this vulnerability, a remote attacker will send a specially formed request to the remote computer on specific RPC ports. It results that a remote attacker can overflow a buffer and gain complete control over a remote computer, which allows them to take any action on the server that they want, such as changing Web pages, reformatting the hard disk, or adding new users to the local administrators group. This vulnerability may be exposed on other ports that the RPC Endpoint Mapper listens on, such as TCP ports 139, 135, 445 and 593.
* References: http://www.microsoft.com/technet/security/bulletin/ms03-039.asp
* Platforms Affected: Windows NT 4.0 Any version Windows 2000 Any version Windows XP Any version Windows Server 2003 Any version |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft's security bulletin MS03-039 at http://www.microsoft.com/technet/security/bulletin/ms03-039.asp
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Workarounds:
Block the port 135(139,445,593) at your firewal. For Windows XP or Windows Server 2003, you can use the Internet Connection Firewall to block inbound RPC traffic from the Internet by default.
-- OR --
Disable DCOM on all affected machines. 1. Run Dcomcnfg.exe via Run from Start menu. For Windows XP or Windows Server 2003, perform these additional steps: 1) Click on the Component Services node under Console Root and Open the Computers sub-folder. 2) For the local computer, right click on My Computer and choose Properties. 3) For a remote computer, right click on the Computers folder and choose New then Computer. Enter the computer name. Right click on that computer name and choose Properties. 2. Choose the <Default Properties> tab. 3. Select (or clear) the "Enable Distributed COM on this Computer" check box.
If service is disabled, all communication between objects on that computer and objects on other computers will be disabled. If you disable DCOM on a remote computer, you will not be able to remotely access that computer afterwards to re-enable DCOM. To re-enable DCOM, you will need physical access to that computer. |
| Related URL |
CVE-2003-0715,CVE-2003-0528,CVE-2003-0605 (CVE) |
| Related URL |
8458 (SecurityFocus) |
| Related URL |
13129 (ISS) |
|