Executive Summary

Title Microsoft Windows Active Directory fails to properly validate LDAP requests
Name VU#487905 First vendor Publication 2007-07-10
Vendor VU-CERT Last vendor Modification 2007-07-19
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#487905

Microsoft Windows Active Directory fails to properly validate LDAP requests


A vulnerability in Windows Active Directory could allow a remote attacker to execute arbitrary code on a vulnerable system.

I. Description

The Lightweight Directory Access Protocol (LDAP) is a standard protocol that enables users to query or modify the data in a meta directory. Microsoft's Active Directory is a directory service provided with Windows 2000 Server and Windows 2003 Server that stores information about objects on a network and makes this information available to users and network administrators. LDAP is the primary access protocol for Windows Active Directory.

The LDAP service provided with these systems fails to perform sufficient checks for the number of convertible attributes included in a LDAP request. This vulnerability could be exploited by a remote attacker with the ability to supply a specially crafted packet to the affected system. Microsoft states that the attacker would not need to be authenticated to exploit this vulnerability on an affected Windows 2000 Server system while the attacker must have valid authentication credentials to exploit this vulnerability on an affected Windows Server 2003 system.

II. Impact

A remote attacker may be to execute arbitrary code on an affected system or cause the Active Directory service to crash, resulting in a denial of service.

III. Solution

Apply a patch from the vendor

Microsoft has addressed this issue in Microsoft Security Bulletin MS07-039. Users are encouraged to review this bulletin and apply the updates it refers to.
In addition to the patches referred to above, Microsoft Security Bulletin MS07-039 also contains several workarounds for this issue. Users, particularly those who are unable to apply the patches are encouraged to implement these workarounds.

Systems Affected

VendorStatusDate Updated
Microsoft CorporationVulnerable10-Jul-2007




Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Neel Mehta of IBM Internet Security Systems X-Force, for reporting this issue to them.

This document was written by Chad R Dougherty.

Other Information

Date Public07/10/2007
Date First Published07/10/2007 03:51:54 PM
Date Last Updated07/19/2007
CERT Advisory 
CVE NameCVE-2007-0040
Document Revision8

Original Source

Url : http://www.kb.cert.org/vuls/id/487905

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:2012
Oval ID: oval:org.mitre.oval:def:2012
Title: Windows Active Directory Remote Code Execution Vulnerability
Description: The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4, Server 2003 SP1 and SP2, Server 2003 x64 Edition and SP2, and Server 2003 for Itanium-based Systems SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted LDAP request with an unspecified number of "convertible attributes."
Family: windows Class: vulnerability
Reference(s): CVE-2007-0040
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows Server 2003
Definition Synopsis:

CPE : Common Platform Enumeration

Os 1
Os 5

Open Source Vulnerability Database (OSVDB)

Id Description
35960 Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote ...

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows Active Directory Crafted LDAP ModifyRequest
RuleID : 20671 - Revision : 6 - Type : OS-WINDOWS
2014-01-10 Microsoft Windows Active Directory Crafted LDAP ModifyRequest
RuleID : 12069 - Revision : 13 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2007-07-11 Name : It is possible to execute code on the remote host.
File : smb_kb926122.nasl - Type : ACT_GATHER_INFO
2007-07-10 Name : It is possible to execute code on the remote host.
File : smb_nt_ms07-039.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-05-08 13:28:04
  • Multiple Updates