News
Microsoft Releases Two New Security Warnings
- By Scott Bekker
- February 24, 2000
Microsoft has released two new security warnings, one regarding Microsoft Windows Media Services and one regarding Microsoft Systems Management Server (SMS). The vulnerability in Windows Media Services could allow denial of service attacks against a streaming media server, and the vulnerability in SMS could allow a user to gain elevated privileges on the local machine.
With Windows Media Services, the handshake sequence between a Windows Media server and a Windows Media Player is asynchronous, because certain resource requests are dependent on the successful completion of previous ones. If the client-side handshake packets are sent in a particular, misordered sequence, with certain timing constraints, the server will attempt to use a resource before it has been initialized and will fail catastrophically, causing the Windows Media Unicast Service to crash. The Windows Media Unicast Service can be put back into normal operating condition by restarting the service, but any sessions that were in effect at the time of the crash would need to be restarted.
Microsoft Windows Media Services 4.0 and 4.1 are affected. The patch for Windows NT Server 4.0 is available at http://download.microsoft.com/download/winmediatech40/Update/4954/NT4/EN-US/WMSU4954_NT4.EXE and the patch for Windows 2000 Server is available at http://download.microsoft.com/download/winmediatech40/Update/4954/NT5/EN-US/WMSU4954_Win2000.EXE.
With SMS, if the SMS 2.0 Remote Control feature has been installed and enabled on a machine, the folder in which the remote agent resides has its permissions set to Everyone Full Control by default. If a malicious user replaced the client code with code of his choosing, it would run automatically in a system context the next time he rebooted the machine and logged on. The vulnerability exists only if the Remote Control feature has been enabled. No other SMS features are affected by it.
Microsoft Systems Management Server 2.0 is affected by this vulnerability. The patch for X86 machines is available at http://www.microsoft.com/Downloads/Release.asp?ReleaseID=18948 and the patch for Alpha machines is available at http://www.microsoft.com/Downloads/Release.asp?ReleaseID=18499. - Isaac Slepner
About the Author
Scott Bekker is editor in chief of Redmond Channel Partner magazine.