|
发表于 2004-1-31 18:56:28
|
显示全部楼层
microsoft-ds 445/tcp
microsoft-ds 445/udp
Windows 2000 microsoft-ds Denial of Service
Summary
The default LANMAN registry settings on Windows 2000 could allow a malicious user, with access to TCP port 445 on your Windows 2000, to cause a Denial of Service.
Details
Vulnerable systems:
- Windows 2000 Server (SP0, SP1, SP2)
- Windows 2000 Advanced Server (SP0, SP1, SP2)
- Windows 2000 Professional (SP0, SP1, SP2)
Sending malformed packets to the microsoft-ds port (TCP 445) can result in kernel resources being allocated by the LANMAN service. The consequences of such an attack could vary from the Windows 2000 host completely ignoring the attack to a blue screen.
An attack could be something as simple as sending a continuous stream of 10k NULL chars to TCP port 445.
The most common symptoms would be that the LANMAN service would allocate a lot of kernel memory, until a point, where very few applications would be able to run. The routine that draws windows would commence to draw incomplete windows, a warning "beep" would be replaced by an error stating that the sound driver could not be loaded. Internet Information Server would no longer be able to service .ASP pages, attempts to reboot the server (as administrator) would result in the error "You do not have permissions to shutdown or restart this computer".
It would frequently be possible to cause the system service to enter a state where it constantly uses 100% of its CPU time. A PC was left in this state over the weekend, to see if it would recover on its own. It did not recover.
Vendor response:
The vendor was contacted mid-October, 2001. The vendor released a Q-article, describing the problem and possible solutions on the 11th of April, 2002. KPMG was notified of the publication on the 17th of April, 2002.
Corrective action:
The vendor has suggested two possible solutions, available here:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q320751 |
|