Vulnerability Note VU#939074
Microsoft Windows XP named pipe fails to restrict anonymous access
Overview
The Server service running on Microsoft Windows XP leaks authentication information.
Description
The Server service (srvsvc.dll) is a component of the Server Message Block (SMB), and its follow-on, Common Internet File System (CIFS). These are network protocols that Windows uses to share files, printers, serial ports, and communicate between computers. If the Server service is running on Microsoft Windows XP, a remote attacker may be able to access it anonymously via a named pipe. In addition, if that attacker supplies the service with a specially crafted message, they will receive a response that may allow them to determine what other users are accessing a shared resource. This vulnerability affects Microsoft Windows XP SP 1, Windows XP SP 2, and Windows XP 64-Bit Edition SP 1. |
Impact
A remote, unauthenticated attacker may be able to access authentication information for users running Microsoft Windows XP. |
Solution
Apply Patch |
Disable the Computer Browser Service |
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Microsoft Corporation | Affected | - | 08 Feb 2005 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
- http://www.us-cert.gov/cas/techalerts/TA05-039A.html
- http://www.microsoft.com/technet/security/Bulletin/MS05-007.mspx
- http://support.microsoft.com/?kbid=188001
Credit
This vulnerability was reported in Microsoft Security Bulletin MS05-007. Microsoft credits Jean-Baptiste Marchand with providing information regarding this issue.
This document was written by Jeff Gennari based on information provided in Microsoft Security Bulletin MS05-007.
Other Information
- CVE IDs: CAN-2005-0051
- Date Public: 08 Feb 2005
- Date First Published: 08 Feb 2005
- Date Last Updated: 10 Feb 2005
- Severity Metric: 4.86
- Document Revision: 57
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.