1. /
  2. Security Response/
  3. Microsoft Windows ntdll.dll Buffer Overflow Vulnerability

Microsoft Windows ntdll.dll Buffer Overflow Vulnerability

Risk

High

Date Discovered

March 17, 2003

Description

The Windows library ntdll.dll includes a function that does not perform sufficient bounds checking. The vulnerability is present in the function "RtlDosPathNameToNtPathName_U" and may be exploited through other programs that use the library if an attack vector permits it. One of these programs is the implementation of WebDAV that ships with IIS 5.0. The vector allows for the vulnerability in ntdll.dll to be exploited by a remote attacker. Several other library functions which call the vulnerable ntdll.dll procedure have been identified. Administrators are advised to patch as other attack vectors are likely to surface. ** Microsoft has revised its advisory to state that this vulnerability affects Windows NT systems. As Windows NT does not support WebDAV, exploits using WebDAV as the attack vector will not be effective against Windows NT systems. Windows XP does not also include WebDAV by default, but other attack vectors may be possible, especially in cases where the attacker has interactive access to the system. WebDAV may be installed by a user on Windows XP with IIS 5.1, so WebDAV may be a possible means of exploitation in these circumstances. ** Reports suggest that numerous hosts have been scanned in an attempt to exploit this vulnerability. Although unconfirmed, this may be the result of a system of automated attacks. ** It has been reported that this vulnerability is also present in the "RtlGetFullPathName_U" function. The supplied Microsoft patch (Q815021) also corrects this function. ** It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability.

Technologies Affected

  • Cisco Broadband Troubleshooter
  • Cisco Building BroadBand Services Manager Hotspot 1.0.0
  • Cisco Building Broadband Service Manager 5.1.0
  • Cisco Building Broadband Service Manager 5.2.0
  • Cisco Call Manager
  • Cisco Call Manager 1.0.0
  • Cisco Call Manager 2.0.0
  • Cisco Call Manager 3.0.0
  • Cisco Call Manager 3.1.0
  • Cisco Call Manager 3.1.0 (2)
  • Cisco Call Manager 3.1.0 (3a)
  • Cisco Call Manager 3.2.0
  • Cisco Call Manager 3.3.0
  • Cisco Call Manager 3.3.0 (3)
  • Cisco CiscoWorks VPN/Security Management Solution
  • Cisco Collaboration Server
  • Cisco Conference Connection
  • Cisco Customer Response Application Server
  • Cisco DOCSIS CPE Configurator
  • Cisco Dynamic Content Adapter
  • Cisco E-Mail Manager
  • Cisco Emergency Responder
  • Cisco IP Contact Center Enterprise
  • Cisco IP Contact Center Express
  • Cisco IP Telephony Environment Monitor
  • Cisco IP/VC 3540 Application Server
  • Cisco IP/VC 3540 Video Rate Matching Module
  • Cisco Intelligent Contact Manager
  • Cisco Intelligent Contact Manager 5.0.0
  • Cisco Internet Service Node
  • Cisco Lan Management Solution
  • Cisco Media Blender
  • Cisco Network Registar
  • Cisco Networking Services for Active Directory
  • Cisco Personal Assistant
  • Cisco QoS Policy Manager
  • Cisco Routed Wan Management
  • Cisco SN 5420 Storage Router 1.1.0 (2)
  • Cisco SN 5420 Storage Router 1.1.0 (3)
  • Cisco SN 5420 Storage Router 1.1.0 (4)
  • Cisco SN 5420 Storage Router 1.1.0 (5)
  • Cisco SN 5420 Storage Router 1.1.0 (7)
  • Cisco SN 5420 Storage Router 1.1.3
  • Cisco SN 5428 Storage Router SN5428-2-3.3.1-K9
  • Cisco SN 5428 Storage Router SN5428-2-3.3.2-K9
  • Cisco SN 5428 Storage Router SN5428-2.5.1-K9
  • Cisco SN 5428 Storage Router SN5428-3.2.1-K9
  • Cisco SN 5428 Storage Router SN5428-3.2.2-K9
  • Cisco SN 5428 Storage Router SN5428-3.3.1-K9
  • Cisco SN 5428 Storage Router SN5428-3.3.2-K9
  • Cisco Secure Access Control Server 3.2.1
  • Cisco Secure Policy Manager 3.0.1
  • Cisco Secure Scanner
  • Cisco Service Management
  • Cisco Small Network Management Solution
  • Cisco Trailhead
  • Cisco Transport Manager
  • Cisco Unity Server
  • Cisco Unity Server 2.0.0
  • Cisco Unity Server 2.1.0
  • Cisco Unity Server 2.2.0
  • Cisco Unity Server 2.3.0
  • Cisco Unity Server 2.4.0
  • Cisco Unity Server 2.46.0
  • Cisco Unity Server 3.0.0
  • Cisco Unity Server 3.1.0
  • Cisco Unity Server 3.2.0
  • Cisco Unity Server 3.3.0
  • Cisco Unity Server 4.0.0
  • Cisco User Registration Tool
  • Cisco VPN/Security Management Solution
  • Cisco Voice Manager
  • Cisco Wireless Lan Solution Engine
  • Cisco uOne Enterprise Edition
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows 2000 Advanced Server SP1
  • Microsoft Windows 2000 Advanced Server SP2
  • Microsoft Windows 2000 Advanced Server SP3
  • Microsoft Windows 2000 Datacenter Server
  • Microsoft Windows 2000 Datacenter Server SP1
  • Microsoft Windows 2000 Datacenter Server SP2
  • Microsoft Windows 2000 Datacenter Server SP3
  • Microsoft Windows 2000 Professional
  • Microsoft Windows 2000 Professional SP1
  • Microsoft Windows 2000 Professional SP2
  • Microsoft Windows 2000 Professional SP3
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Server SP1
  • Microsoft Windows 2000 Server SP2
  • Microsoft Windows 2000 Server SP3
  • Microsoft Windows 2000 Terminal Services
  • Microsoft Windows 2000 Terminal Services SP1
  • Microsoft Windows 2000 Terminal Services SP2
  • Microsoft Windows 2000 Terminal Services SP3
  • Microsoft Windows NT Enterprise Server 4.0
  • Microsoft Windows NT Enterprise Server 4.0 SP1
  • Microsoft Windows NT Enterprise Server 4.0 SP2
  • Microsoft Windows NT Enterprise Server 4.0 SP3
  • Microsoft Windows NT Enterprise Server 4.0 SP4
  • Microsoft Windows NT Enterprise Server 4.0 SP5
  • Microsoft Windows NT Enterprise Server 4.0 SP6
  • Microsoft Windows NT Enterprise Server 4.0 SP6a
  • Microsoft Windows NT Server 4.0
  • Microsoft Windows NT Server 4.0 SP1
  • Microsoft Windows NT Server 4.0 SP2
  • Microsoft Windows NT Server 4.0 SP3
  • Microsoft Windows NT Server 4.0 SP4
  • Microsoft Windows NT Server 4.0 SP5
  • Microsoft Windows NT Server 4.0 SP6
  • Microsoft Windows NT Server 4.0 SP6a
  • Microsoft Windows NT Terminal Server 4.0
  • Microsoft Windows NT Terminal Server 4.0 SP1
  • Microsoft Windows NT Terminal Server 4.0 SP2
  • Microsoft Windows NT Terminal Server 4.0 SP3
  • Microsoft Windows NT Terminal Server 4.0 SP4
  • Microsoft Windows NT Terminal Server 4.0 SP5
  • Microsoft Windows NT Terminal Server 4.0 SP6
  • Microsoft Windows NT Workstation 4.0
  • Microsoft Windows NT Workstation 4.0 SP1
  • Microsoft Windows NT Workstation 4.0 SP2
  • Microsoft Windows NT Workstation 4.0 SP3
  • Microsoft Windows NT Workstation 4.0 SP4
  • Microsoft Windows NT Workstation 4.0 SP5
  • Microsoft Windows NT Workstation 4.0 SP6
  • Microsoft Windows NT Workstation 4.0 SP6a
  • Microsoft Windows XP 64-bit Edition
  • Microsoft Windows XP 64-bit Edition SP1
  • Microsoft Windows XP Home
  • Microsoft Windows XP Home SP1
  • Microsoft Windows XP Professional
  • Microsoft Windows XP Professional SP1

Recommendations

Block external access at the network boundary, unless external parties require service.

Block access to services at the edge of the network if they are not required by external users.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.

Exploitation attempts may be captured by IDS logs. Examine logs regularly for signs of attempted exploitation.

Remove any unnecessary default programs that operate with privileges.

Remove any IIS components that are not absolutely required to operate the webserver.
Some reports indicate that the Microsoft patches for this issue may cause problems. It is not known if this is the result of the patches conflicting with certain configurations. Administrators are advised to apply workaround procedures if problems are experienced after applying the patch. Microsoft has updated the bulletin with information regarding possible sources of conflicts with this patch. For precise details, see the Caveats section under Additional information about this patch in the Microsoft Security Bulletin. Microsoft has revised its advisory to state that this vulnerability affects Windows NT systems. As Windows NT does not support WebDAV, exploits using WebDAV as the attack vector will not be effective against Windows NT systems. Microsoft has released a new revision of the advisory which contains patches for Windows XP. Microsoft has released fixes:

Credits

Announced by the vendor.
Copyright © Symantec Corporation.
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response, and secure@symantec.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
Internet Security Threat Report
Symantec DeepSight Screensaver