Executive Summary

Summary
Title Proof of Concept Code Published Affecting the Remote Access Connection Manager Service
Informations
Name KB921923 First vendor Publication 2006-06-23
Vendor Microsoft Last vendor Modification 2006-06-23
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft is aware that detailed exploit code has been published on the Internet for the vulnerability that is addressed by Microsoft security bulletin MS06-025. Microsoft is not currently aware of active attacks that use this exploit code or of customer impact at this time. However, Microsoft is actively monitoring this situation to keep customers informed and to provide customer guidance as necessary.

Our investigation of this exploit code has verified that it does not affect customers who have installed the updates detailed in MS06-025 on their computers.Microsoft continues to recommend that customers apply the updates to the affected products by enabling the Automatic Updates feature in Windows.

Microsoft is disappointed that certain security researchers have breached the commonly accepted industry practice of withholding vulnerability data so close to update release and have published exploit code, potentially harming computer users.We continue to urge security researchers to disclose vulnerability information responsibly and allow customers time to deploy updates so they do not aid criminals in their attempt to take advantage of software vulnerabilities

Mitigating Factors:

Customers who have installed the MS06-025 security update are not affected by this vulnerability.

Windows 2000 systems are primarily at risk from this vulnerability. Customers running Windows 2000 should deploy MS06-025 as soon as possible or disable the RASMAN service.

On Windows XP Service Pack 2, Windows Server 2003 and Windows Server 2003 Service Pack 1 the attacker would need to have valid logon credentials in order to exploit the vulnerability.

This issue does not affect Windows 98, Windows 98 SE, or Windows Millennium Edition.

What is the scope of the advisory?
Microsoft is aware of public posting of exploit code targeting vulnerabilities identified in Microsoft Security Update MS06-025. This affects the software that is listed in the “Overview” section

Is this a security vulnerability that requires Microsoft to issue a security update?
No. Customers who have installed the MS06-025 security update are not affected by this vulnerability. No additional update is required.

What causes this threat?
An unchecked buffer in Routing and Remote Access technologies specifically affecting the Remote Access Connection Manager Service (RASMAN)

What does the feature do?
The Remote Access Connection Manager is a service that handles the details of establishing the connection to the remote server. This service also provides the client with status information during the connection operation. The Remote Access Connection Manager starts automatically when an application loads the RASAPI32.DLL

What might an attacker use this function to do?
An attacker who successfully exploited this vulnerability could take complete control of the affected system.

Are there any known issues with installing Microsoft Security Update MS06-025 that protects against this threat?
Microsoft Knowledge Base Article 911280documents the currently known issues that customers may experience when they install the security update. Only customers who use dial-up connections that use scripts that configure their device for parity, stop bits or data bits or a post-connect terminal window or dial-up scripting, are affected by the issues identified in the KB article. If customers do not use any of the dial-up scenarios identified they are encouraged to install the update immediately..

Original Source

Url : http://www.microsoft.com/technet/security/advisory/921923.mspx

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2016-04-26 17:51:59
  • Multiple Updates