Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580)

Published: 2006-05-09
Last Updated: 2006-05-09 18:32:27 UTC
by Lorna Hutcheson (Version: 1)
0 comment(s)
MS06-018, CVE-2006-0034, CVE-2006-1184

This update patches two vulnerabilities in MSDTC
Both represent a denial of service in MSDTC which can be exploited locally
or remotely with malformed messages.

This vulnerability is listed as moderate for Windows 2000 versus Low for
XP and 2003 because MSDTC is enabled by default on that platform. The
severity is the same on the other platforms when the service is running.

There are three categories of mitigation available, but it is recommended
the patch be applied if possible. #1. The service can be disabled, but
this can affect a number of applications such as SQL Server, Exchange,
BizTalk, etc. #2 Network access for DTC can be disabled. This can also
affect services. Also its important to note that the vulnerability could
still be exploited locally. #3 Block network traffic with a firewall (host
or network). Traffic on ports greater than 1024 would need to be blocked
as well as any other configured RPC port.

Also note that this bulletin replaces MS05-051 on Windows 2000.

From Symantec:
"Although corrected in MS05-051, additional memory added in the allocater
for memory accounting was not accounted for. These additional 8 bytes can
be overwritten.These issues will kill the process and DoS the service."

(Thanks Robert for the write-up)

0 comment(s)


Diary Archives