Microsoft Warns of W2K Bug
- By Scott Bekker
- August 31, 2000
Microsoft Corp. has released a patch that eliminates a security vulnerability in Windows 2000. The vulnerability could allow a malicious user to disrupt normal operation of an affected machine, and potentially of an entire network.
Microsoft users who have already applied Windows 2000 Service Pack 1 are protected against the vulnerability and do not need to take further action.
The vulnerability could allow a malicious user to corrupt parts of a Windows 2000 system's local security policy, with the effect of disrupting domain membership and trust relationship information. If a workstation or member server were attacked via this vulnerability, it would effectively remove the machine from the domain; if a domain controller were attacked, it could no longer process domain logon requests. Recovering from such an attack would likely require that a known working configuration be restored from backup.
It would not be necessary to be an authenticated domain member in order to mount an attack in this manner. Any user who could establish an RPC connection with an affected machine and send the proper command sequence to it could exploit the vulnerability. If the malicious user were an intranet user, he could likely attack any machine within the network; if the malicious user were on the Internet, he could likely only attack machines on the network edge that allow RPC connections.
Microsoft Windows 2000 Professional, Server, and Advanced Server are all affected. The patch is available at http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24019. - Isaac Slepner
Scott Bekker is editor in chief of Redmond Channel Partner magazine.