CERT-In Vulnerability Note
CIVN-2011-0188
Microsoft Windows Active Directory Remote Code Execution Vulnerability
Original Issue Date:December 14, 2011
Severity Rating: MEDIUM
Systems Affected
- Windows XP Service Pack 3
- Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Component Affected
- Active Directory
- Active Directory Application Mode (ADAM)
- Active Directory Lightweight Directory Service (AD LDS)
Overview
A vulnerability has been reported in Active Directory, Active Directory Application Mode (ADAM) and Active Directory Lightweight Directory Service (AD LDS) components in Microsoft Windows, which could allow an attacker to execute an arbitrary code.
Description
This vulnerability is caused due to an error in the implementations of Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) components when handling certain queries in Microsoft Windows. An attacker with valid logon credentials of an Active Directory domain could exploit this vulnerability via a specially crafted query to trigger a buffer overflow error. Successful exploitation of these vulnerability could allow an attacker to execute an arbitrary code.
Workaround
- Block TCP port 389 for both inbound and outbound traffic at enterprise firewall
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS11-095
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS11-095.mspx
References
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS11-095.mspx
http://support.microsoft.com/kb/2640045
Secunia
http://secunia.com/advisories/47202/
Securityfocus
http://www.securityfocus.com/bid/50959
CVE Name
CVE-2011-3406
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|