Executive Summary
Summary | |
---|---|
Title | Microsoft Windows Active Directory fails to properly validate LDAP requests |
Informations | |||
---|---|---|---|
Name | VU#487905 | First vendor Publication | 2007-07-10 |
Vendor | VU-CERT | Last vendor Modification | 2007-07-19 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#487905Microsoft Windows Active Directory fails to properly validate LDAP requestsOverviewA vulnerability in Windows Active Directory could allow a remote attacker to execute arbitrary code on a vulnerable system.I. DescriptionThe Lightweight Directory Access Protocol (LDAP) is a standard protocol that enables users to query or modify the data in a meta directory. Microsoft's Active Directory is a directory service provided with Windows 2000 Server and Windows 2003 Server that stores information about objects on a network and makes this information available to users and network administrators. LDAP is the primary access protocol for Windows Active Directory.The LDAP service provided with these systems fails to perform sufficient checks for the number of convertible attributes included in a LDAP request. This vulnerability could be exploited by a remote attacker with the ability to supply a specially crafted packet to the affected system. Microsoft states that the attacker would not need to be authenticated to exploit this vulnerability on an affected Windows 2000 Server system while the attacker must have valid authentication credentials to exploit this vulnerability on an affected Windows Server 2003 system. Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.
References
Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Neel Mehta of IBM Internet Security Systems X-Force, for reporting this issue to them. This document was written by Chad R Dougherty.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/487905 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:2012 | |||
Oval ID: | oval:org.mitre.oval:def:2012 | ||
Title: | Windows Active Directory Remote Code Execution Vulnerability | ||
Description: | The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4, Server 2003 SP1 and SP2, Server 2003 x64 Edition and SP2, and Server 2003 for Itanium-based Systems SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted LDAP request with an unspecified number of "convertible attributes." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2007-0040 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 5 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
35960 | Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote ... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows Active Directory Crafted LDAP ModifyRequest RuleID : 20671 - Revision : 6 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows Active Directory Crafted LDAP ModifyRequest RuleID : 12069 - Revision : 13 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-07-11 | Name : It is possible to execute code on the remote host. File : smb_kb926122.nasl - Type : ACT_GATHER_INFO |
2007-07-10 | Name : It is possible to execute code on the remote host. File : smb_nt_ms07-039.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-05-08 13:28:04 |
|