Microsoft Windows domain controllers do not properly handle some Kerberos messages, potentially allowing a remote, authenticated attacker to cause a denial-of-service condition.
Microsoft Windows domain controllers running Windows 2000 Server and Server 2003 use the Kerberos protocol for authentication by default. The Kerberos implementation in the affected products is vulnerable to a flaw in handling messages from remote authenticated users. This flaw may allow an attacker to cause the authentication system to stop responding or to forcefully reboot the domain controller.
Systems running the affected products that do not function as domain controllers are not affected. Windows 2000 Professional and Windows XP are not affected. The attacker must have valid logon credentials in order to exploit the vulnerability.
A remote authenticated user that is able to send a specially-crafted message may be able to cause the domain controller authentication service to stop responding, or to force the machine to reboot.
Apply An Update
Thanks to Microsoft Security Advisory for information on this vulnerability, who in turn thank Tony Chin of Shell, Inc. for reporting the issue.
This document was written by Ken MacInnis.
|Date First Published:||2005-08-10|
|Date Last Updated:||2005-08-10 15:08 UTC|