News

Microsoft Reports Critical Vulnerability in Windows 2000, XP

Microsoft Corp. reported a critical vulnerability in Windows 2000 and Windows XP on Thursday. The flaw results from an unchecked buffer in Microsoft's Point-to-Point Tunneling Protocol (PPTP) implementation in the two operating systems. An attacker could exploit the flaw to mount a denial of service attack.

The bulletin was one of three security bulletins released by Microsoft's security team on Thursday morning. The other newly patched vulnerabilities involve Internet Information Server and Windows 2000.

PPTP is a Virtual Private Networking technology natively supported in Windows 2000 and Windows XP. According to the bulletin, the unchecked buffer exists in a section of code that processes the control data used to establish, maintain and tear down PPTP connections.

An attacker would exploit the flaw by sending specially malformed PPTP control data to a server or workstation acting as a server. The attack could corrupt kernel memory and cause the system to fail. Rebooting restores normal operation. PPTP is not enabled by default on any Windows system so servers have to be configured to offer PPTP services to be vulnerable.

In a separate bulletin, four less serious vulnerabilities in IIS got patches. The most serious of the vulnerabilities makes it possible for applications on a server to gain system-level privileges. The patch for the flaws is cumulative, including all IIS-related fixes since Windows NT 4.0 Service Pack 6a.

The other security vulnerability, rated "moderate," by Microsoft is that default permissions in Windows 2000 could allow a Trojan horse program. Microsoft says the systems most at risk from this vulnerability is a workstation shared by several users. The attacker would need to be able to log on locally to load the Trojan horse.

So far this year, Microsoft has distributed 64 security bulletins for its products.

Click here to view Microsoft's new security bulletins:

  • Cumulative patch for IIS vulnerabilities,
  • Critical PPTP implementation flaw,
  • Trojan horse program execution.

  • About the Author

    Scott Bekker is editor in chief of Redmond Channel Partner magazine.

    Featured

    • Microsoft Offers Support Extensions for Exchange 2016 and 2019

      Microsoft has introduced a paid Extended Security Update (ESU) program for on-premises Exchange Server 2016 and 2019, offering a crucial safety cushion as both versions near their Oct. 14, 2025 end-of-support date.

    • An image of planes flying around a globe

      2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

      Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

    • Notebook

      Microsoft Centers AI, Security and Partner Dogfooding at MCAPS

      Microsoft's second annual MCAPS for Partners event took place Tuesday, delivering a volley of updates and directives for its partners for fiscal 2026.

    • Microsoft Layoffs: AI Is the Obvious Elephant in the Room

      As Microsoft doubles down on an $80 billion bet on AI this fiscal year, its workforce reductions are drawing scrutiny over whether AI's ascent is quietly reshaping its human capital strategy, even as official messaging avoids drawing a direct line.