Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (Microsoft)  >   Rpc Vendors:   Microsoft
Windows RPC NTLMSSP Authentication Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1018787
SecurityTracker URL:
CVE Reference:   CVE-2007-2228   (Links to External Site)
Date:  Oct 9 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP2, Vista
Description:   A vulnerability was reported in Microsoft Windows. A remote user can cause denial of service conditions.

The Windows RPC code does not properly communicate with the NTLM security provider when performing authentication of RPC requests. A remote user can send specially crafted RPC data using the NTLMSSP authentication type to cause the target system to become unresponsive and then restart.

Zero Day Initiative reported this vulnerability.

Impact:   A remote user can cause the target system to restart.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

Windows XP Service Pack 2:

Windows XP Professional x64 Edition:

Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:

Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:

Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:

Windows Vista:

Windows Vista x64 Edition:

A restart is required.

The Microsoft advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC