<<< Date Index >>>     <<< Thread Index >>>

Alert: Microsoft Security Bulletin - MS03-034



http://www.microsoft.com/technet/security/bulletin/MS03-034.asp

Flaw in NetBIOS Could Lead to Information Disclosure (824105)

Originally posted: September 03, 2003

Summary

Who should read this bulletin: Customers using Microsoft® Windows®

Impact of vulnerability: Information disclosure

Maximum Severity Rating: Low

Recommendation: Users should evaluate whether to apply the security patch to 
affected systems.

End User Bulletin:
An end user version of this bulletin is available at: 

http://www.microsoft.com/security/security_bulletins/ms03-034.asp. 

Affected Software: 
- Microsoft Windows NT 4.0® Server
- Microsoft Windows NT 4.0, Terminal Server Edition
- Microsoft Windows 2000
- Microsoft Windows XP 
- Microsoft Windows Server(tm) 2003
Not Affected Software:
- Microsoft Windows Millennium EditionAn End User version of the bulletin is 
available at:
http://www.microsoft.com/security/security_bulletins/ms03-034.asp. 

Technical description: 

Network basic input/output system (NetBIOS) is an application programming 
interface (API) that can be used by programs on a local area network (LAN). 
NetBIOS provides programs with a uniform set of commands for requesting the 
lower-level services required to manage names, conduct sessions, and send 
datagrams between nodes on a network. 

This vulnerability involves one of the NetBT (NetBIOS over TCP) services, 
namely, the NetBIOS Name Service (NBNS). NBNS is analogous to DNS in the TCP/IP 
world and it provides a way to find a system's IP address given its NetBIOS 
name, or vice versa. 

Under certain conditions, the response to a NetBT Name Service query may, in 
addition to the typical reply, contain random data from the target system's 
memory. This data could, for example, be a segment of HTML if the user on the 
target system was using an Internet browser, or it could contain other types of 
data that exist in memory at the time that the target system responds to the 
NetBT Name Service query.

An attacker could seek to exploit this vulnerability by sending a NetBT Name 
Service query to the target system and then examine the response to see if it 
included any random data from that system's memory.

If best security practices have been followed and port 137 UDP has been blocked 
at the firewall, Internet based attacks would not be possible.

Mitigating factors:
- Any information disclosure would be completely random.
- By default, the Internet Connection Firewall (ICF), which is available with 
Windows XP and Windows Server 2003, blocks the ports that are used by NetBT.
- To exploit this vulnerability, an attacker would have to be able to send a 
specially-crafted NetBT request to port 137 on the target system and then 
examine the response to see whether any random data from that system's memory 
is included. In intranet environments, these ports are usually accessible, but 
systems that are connected to the Internet usually have these ports blocked by 
a firewall.

Vulnerability identifier: CAN-2003-0661



This email is sent to NTBugtraq automatically as a service to my subscribers. 
(v1.18)

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
Whatever Happened to Octopus?

LEGATO RepliStor, formerly known as Octopus, delivers breakthrough
replication performance that's 5X faster than the competition in an
independent head-to-head test. Learn how RepliStor uses patented,
asynchronous, real-time replication, to deliver disaster recovery, data
distribution and consolidated backups. It is the first replication solution
to achieve Windows 2003 certification. Get the performance report now.

http://portal1.legato.com/products/replistor/upgrade.cfm

oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo