Skip navigation

Denial of Service in Windows Kerberos, PKINIT, and RDP

Denial of Service in Windows Kerberos, PKINIT, and RDP

Reported August 9, 2005 by Microsoft

VERSIONS AFFECTED

Windows 2000
Windows XP
Windows Server 2003

DESCRIPTION

The Kerberos subsystem contains flaws that could allow an intruder to cause a denial of service. The flaw is due to the way domain controllers (DCs) process Kerberos messages. The related PKINIT protocol contains a design flaw that could allow information disclosure and spoofing, which could let an intruder intercept communication between a client and server.

RDP contains a flaw that could allow an intruder to launch a Denial of Service (DoS) attack against an affected system. Such an attack might cause the server to stop responding and to automatically reboot itself.

VENDOR RESPONSE

Microsoft released Security Bulletin MS05-042, "Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)," and an associated patch to correct the problem with the Kerberos? service.

Microsoft released Security Bulletin MS05-041, "Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (899591)," and an associated patch to correct the problem with RDP.

CREDITS

Tony Chin and Geert Jansen of Shell reported the Kerberos vulnerability; Andre Scedrov, Iliano Cervesato, Aaron Jaggard, Joe-Kai Tsay, and Chris Walstad reported the PKINIT vulnerability; Tom Ferris of Security Protocols reported the RDP vulnerability.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish