CERT-In Vulnerability Note
CIVN-2010-0235
Microsoft Windows SChannel TLSv1 Remote Denial of Service vulnerability
Original Issue Date:October 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Windows XP Service Pack 3
- Microsoft Windows XP Professional x64 Edition Service Pack 2
- Microsoft Windows Server 2003 Service Pack 2
- Microsoft Windows Server 2003 x64 Edition Service Pack 2
- Microsoft Windows Server 2003 SP2 (Itanium)
- Microsoft Windows Vista Service Pack 1
- Microsoft Windows Vista Service Pack 2
- Microsoft Windows Vista x64 Edition Service Pack 1
- Microsoft Windows Vista x64 Edition Service Pack 2
- Microsoft Windows Server 2008 (32-bit)
- Microsoft Windows Server 2008 (32-bit) Service Pack 2
- Microsoft Windows Server 2008 (x64)
- Microsoft Windows Server 2008 (x64) Service Pack 2
- Microsoft Windows Server 2008 (Itanium)
- Microsoft Windows Server 2008 (Itanium) Service Pack 2
- Microsoft Windows 7 (32-bit)
- Microsoft Windows 7 (x64)
- Microsoft Windows Server 2008 R2 (x64)
- Microsoft Windows Server 2008 R2 (Itanium)
Overview
A vulnerability has been reported in Microsoft Windows SChannel, which could allow a remote attacker to cause a denial of service condition.
Description
The Secure Channel (Schannel) security package is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. Schannel is part of the security package that provides an authentication service to provide secure communications between client and server.
The vulnerability is caused due to the Secure Channel (SChannel) security package failing to check a logical condition when parsing client certificates.
An unauthenticated, remote attacker could exploit this vulnerability by sending a specially crafted client certificate to an affected IIS server hosting a SSL-enabled website(SSL is not enabled not by default in IIS) that that could cause the Local Security Authority Subsystem Service to fail. Exploitation could result in a DoS condition.
Workaround
- Stop SSL Web sites in IIS
Note : For detailed steps and impact of applying these workarounds refer Microsoft security Bulletin MS10-085
Solution
Apply appropriate patches as mentioned in Microsoft security Bulletin
MS10-085
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS10-085.mspx
References
VUPEN
http://www.vupen.com/english/advisories/2010/2046
Secunia
http://secunia.com/advisories/41787/
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=21472
CVE Name
CVE-2009-3229
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|