CERT-In Vulnerability Note
CIVN-2005-0076
Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure and Spoofing
Original Issue Date:August 10, 2005
Severity Rating: MEDIUM
Software Affected
- Microsoft Windows 2000 Service Pack 4
- Microsoft Windows XP Service Pack 1
- Microsoft Windows XP Service Pack 2
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003
- Microsoft Windows Server 2003 Service Pack 1
- Microsoft Windows Server 2003 for Itanium-based Systems
- Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
- Microsoft Windows Server 2003 x64 Edition
Overview
Two vulnerabilities have been reported in Microsoft Windows which could be exploited by an attacker to Information Disclosure or cause Denial of Service.
Description
1. Kerberos Vulnerability - CAN-2005-1981
Kerberos is a default authentication protocol used in Windows 2000 and later operating system versions which provides secure user authentication. This vulnerability exists in the method used by domain controllers to process specially crafted Kerberos messages on port 88. An attacker could exploit this vulnerability by sending a specially crafted message to the domain controllers in a single or multiple forests. Successful exploitation of this vulnerability enables an attacker to cause the domain controller to shutdown. This vulnerability only affects Windows 2000 and Windows Server 2003 domain controllers. Workaround Block UDP and TCP port 88 at the firewall
2. PKINIT Vulnerability - CAN-2005-1982
Windows 2000 and later uses draft 9 of the IETF "Public Key Cryptography for Initial Authentication in Kerberos" Internet Draft PKINIT for authentication through smart card logon. This vulnerability exists due to an error in handling of PKINIT transactions method. To exploit this vulnerability an attacker could perform Man in the Middle attack and access sensitive client network communication by tampering information sent from a domain controller. Successful exploitation enables the attacker to spoof a domain controller and mislead the users.
Solution
Apply the appropriate patches as mentioned in Microsoft Security Bulletin
MS05-042
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx
References
Microsoft Security Bulletin MS05-042
http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx
Secunia Advisory
http://secunia.com/advisories/16368/
FrSIRT Advisory: FrSIRT/ADV-2005-1356
http://www.frsirt.com/english/advisories/2005/1356
CVE Name
CAN-2005-1981
CAN-2005-1982
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|