SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   LANDesk Management Suite Vendors:   LANDesk Software
LANDesk Error Lets Remote Users Crash the Target Host
SecurityTracker Alert ID:  1011787
SecurityTracker URL:  http://securitytracker.com/id/1011787
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 19 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 8
Description:   A vulnerability was reported in LANDesk. A remote user can cause the target system to crash.

Ryan Rounkles reported that a remote user can connect to the remote desktop port (port 3389) on a target system that is being managed by LANDesk to cause the target system to crash and reboot.

The report indicates that at least the following systems are affected:

Windows 2000 Server, Advanced server (SP4 and up)
Windows 2003 Server
Windows XP Pro (SP 2)

The error messages indicate that the flaw is manifested in 'idsintkm.dll'.

The vendor has been notified.

Impact:   A remote user can cause the target system to crash.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.landesk.com/Products/LDMS/index.aspx (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Denial of service in LANDesk 8


When connected to a remote machine with LANDesk version 8, and someone
connects with, or even telnets to the port of, Remote Desktop (3389),
the machine bluescreens, dumps memory, and reboots immediately. I've
tested with:

 Windows 2000 Server, Advanced server (SP4 and up)
 Windows 2003 Server
 Windows XP Pro (SP 2)

The memory dump reports that the problem is in "idsintkm.dll". I
notified LANDesk 2 weeks ago but they have taken no action.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC