Vulnerability Note VU#487905
Microsoft Windows Active Directory fails to properly validate LDAP requests
A vulnerability in Windows Active Directory could allow a remote attacker to execute arbitrary code on a vulnerable system.
The Lightweight Directory Access Protocol (LDAP) is a standard protocol that enables users to query or modify the data in a meta directory. Microsoft's Active Directory is a directory service provided with Windows 2000 Server and Windows 2003 Server that stores information about objects on a network and makes this information available to users and network administrators. LDAP is the primary access protocol for Windows Active Directory.
The LDAP service provided with these systems fails to perform sufficient checks for the number of convertible attributes included in a LDAP request. This vulnerability could be exploited by a remote attacker with the ability to supply a specially crafted packet to the affected system. Microsoft states that the attacker would not need to be authenticated to exploit this vulnerability on an affected Windows 2000 Server system while the attacker must have valid authentication credentials to exploit this vulnerability on an affected Windows Server 2003 system.
A remote attacker may be to execute arbitrary code on an affected system or cause the Active Directory service to crash, resulting in a denial of service.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||10 Jul 2007|
CVSS Metrics (Learn More)
Thanks to Microsoft for reporting this vulnerability. Microsoft, in turn, credits Neel Mehta of IBM Internet Security Systems X-Force, for reporting this issue to them.
This document was written by Chad R Dougherty.
- CVE IDs: CVE-2007-0040
- Date Public: 10 Jul 2007
- Date First Published: 10 Jul 2007
- Date Last Updated: 19 Jul 2007
- Severity Metric: 12.66
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.