CERT-In Vulnerability Note
CIVN-2010-0264
Windows Netlogon Service Could Allow Denial of Service Vulnerability
Original Issue Date:December 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Windows Server 2003 Service Pack 2
- Microsoft Windows Server 2003 x64 Edition Service Pack 2
- Microsoft Windows Server 2003 SP2 (Itanium)
- Microsoft Windows Server 2008 (32-bit)
- Microsoft Windows Server 2008 (32-bit) Service Pack 2
- Microsoft Windows Server 2008 (x64)
- Microsoft Windows Server 2008 (x64) Service Pack 2
- Microsoft Windows Server 2008 R2 (x64)
Overview
The vulnerability has been reported in the Netlogon RPC Service affects versions of Microsoft Windows, and could cause a denial of service. The attacker must be an authenticated user with access to the target network in order to exploit this vulnerability.
Description
The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system.
An attacker with administrative privileges on a machine that is joined to the same domain as the affected domain controller could cause a denial of service by sending a specially crafted Netlogon RPC service.
Solution
Apply patches as mentioned in Microsoft Security bulletin
MS10-101
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-101.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-101.mspx
VUPEN
http://www.vupen.com/english/advisories/2010/3223
CVE Name
CVE-2010-2742
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|