CVE-2002-0863
CVSS5.0
发布时间 :2002-10-11 00:00:00
修订时间 :2016-10-17 22:22:47
NMCOS    

[原文]Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."


[CNNVD]Microsoft Windows加密RDP包远程信息泄露漏洞(MS02-051)(CNNVD-200210-272)

        
        RDP(远程桌面协议,Remote Desktop Protocol)是终端服务器和客户端之间的通信协议,它使得远程用户可以使用键盘和鼠标通过网络在应用程序之间进行通信。
        Microsoft Windows终端服务在使用加密RDP通信时存在问题,远程攻击者可以利用这个漏洞通过截获网络通信判断会话过程中的事件行为。
        当RDP使用加密通信的时候,RDP包开始使用RC4加密,然后把8字节的HMAC明文校验码存放在密文的前面,虽然RC4的加密KEY每4096个包的都刷新不同,但是HMAC的值在会话过程中没有改变,由于校验码依靠包的长度,包内容和HMAC值来确定,如果一个包相同的内容发送两次,就可以发现其校验码是相同的,这样就可以使攻击者获得部分事件信息。如光标闪烁,终端服务客户端设备重定向都会发送相同的数据,导致攻击者可以判断会话进程的事件。
        注:任何使用Microsoft终端服务虚拟通道的插件都存在这个漏洞。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::sp1:home
cpe:/o:microsoft:windows_2000_terminal_services::sp3
cpe:/o:microsoft:windows_2000::sp3:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP3
cpe:/o:microsoft:windows_nt:4.0:sp6a:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP6a
cpe:/o:microsoft:windows_2000_terminal_services::sp1
cpe:/o:microsoft:windows_xp::sp1:64-bit
cpe:/o:microsoft:windows_2000::sp1:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP1
cpe:/o:microsoft:windows_2000::sp2:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP2
cpe:/o:microsoft:windows_nt:4.0:sp5:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP5
cpe:/a:microsoft:.net_windows_server:beta3::standard
cpe:/o:microsoft:windows_nt:4.0:sp2:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP2
cpe:/o:microsoft:windows_2000_terminal_services
cpe:/o:microsoft:windows_nt:4.0:sp6:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP6
cpe:/o:microsoft:windows_2000:::advanced_server
cpe:/o:microsoft:windows_nt:4.0:sp4:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP4
cpe:/o:microsoft:windows_nt:4.0:sp1:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP1
cpe:/o:microsoft:windows_nt:4.0:sp3:terminal_serverMicrosoft Windows NT Terminal Server 4.0 SP3
cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold
cpe:/o:microsoft:windows_2000::sp3:professionalMicrosoft Windows 2000 Professional SP3
cpe:/o:microsoft:windows_2000_terminal_services::sp2
cpe:/o:microsoft:windows_2000::sp1:professionalMicrosoft Windows 2000 Professional SP1
cpe:/o:microsoft:windows_2000::sp2:professionalMicrosoft Windows 2000 Professional SP2
cpe:/o:microsoft:windows_2000:::datacenter_server
cpe:/o:microsoft:windows_2000::sp3:advanced_serverMicrosoft Windows 2000 Advanced Server SP3
cpe:/o:microsoft:windows_2000::sp2:advanced_serverMicrosoft Windows 2000 Advanced Server SP2
cpe:/o:microsoft:windows_2000::sp1:advanced_serverMicrosoft Windows 2000 Advanced Server SP1
cpe:/o:microsoft:windows_nt:4.0::terminal_server
cpe:/o:microsoft:windows_2000::sp1:serverMicrosoft Windows 2000 Server SP1
cpe:/o:microsoft:windows_2000::sp3:serverMicrosoft Windows 2000 Server SP3
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/o:microsoft:windows_2000:::server
cpe:/o:microsoft:windows_2000:::professional
cpe:/o:microsoft:windows_xp:::home
cpe:/o:microsoft:windows_2000::sp2:serverMicrosoft Windows 2000 Server SP2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:199Weak Encryption in RDP Protocol
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0863
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0863
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-272
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=103235960119404&w=2
(UNKNOWN)  BUGTRAQ  20020916 Microsoft Windows Remote Desktop Protocol checksum and keystroke vulnerabilities
http://marc.info/?l=bugtraq&m=103236181522253&w=2
(UNKNOWN)  BUGTRAQ  20020918 Microsoft Windows Terminal Services vulnerabilities
http://www.iss.net/security_center/static/10121.php
(VENDOR_ADVISORY)  XF  win-rdp-checksum-leak(10121)
http://www.iss.net/security_center/static/10122.php
(UNKNOWN)  XF  win-rdp-keystroke-monitoring(10122)
http://www.kb.cert.org/vuls/id/865833
(UNKNOWN)  CERT-VN  VU#865833
http://www.microsoft.com/technet/security/bulletin/ms02-051.asp
(VENDOR_ADVISORY)  MS  MS02-051
http://www.securityfocus.com/bid/5711
(UNKNOWN)  BID  5711
http://www.securityfocus.com/bid/5712
(UNKNOWN)  BID  5712

- 漏洞信息

Microsoft Windows加密RDP包远程信息泄露漏洞(MS02-051)
中危 设计错误
2002-10-11 00:00:00 2005-10-20 00:00:00
远程  
        
        RDP(远程桌面协议,Remote Desktop Protocol)是终端服务器和客户端之间的通信协议,它使得远程用户可以使用键盘和鼠标通过网络在应用程序之间进行通信。
        Microsoft Windows终端服务在使用加密RDP通信时存在问题,远程攻击者可以利用这个漏洞通过截获网络通信判断会话过程中的事件行为。
        当RDP使用加密通信的时候,RDP包开始使用RC4加密,然后把8字节的HMAC明文校验码存放在密文的前面,虽然RC4的加密KEY每4096个包的都刷新不同,但是HMAC的值在会话过程中没有改变,由于校验码依靠包的长度,包内容和HMAC值来确定,如果一个包相同的内容发送两次,就可以发现其校验码是相同的,这样就可以使攻击者获得部分事件信息。如光标闪烁,终端服务客户端设备重定向都会发送相同的数据,导致攻击者可以判断会话进程的事件。
        注:任何使用Microsoft终端服务虚拟通道的插件都存在这个漏洞。
        

- 公告与补丁

        厂商补丁:
        Microsoft
        ---------
        Microsoft已经为此发布了一个安全公告(MS02-051)以及相应补丁:
        MS02-051:Cryptographic Flaw in RDP Protocol can Lead to Information Disclosure(Q324380)
        链接:
        http://www.microsoft.com/technet/security/bulletin/MS02-051.asp

        补丁下载:
         * Windows 2000:
        
        http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41326

         * Windows XP:
        
        http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41288

         * Windows XP 64 bit Edition:
        
        http://www.microsoft.com/Downloads/Release.asp?ReleaseID=41314

- 漏洞信息

866
Cryptographic Info leak in RDP Protocol
Remote / Network Access Cryptographic, Information Disclosure
Loss of Confidentiality

- 漏洞描述

Microsoft's Remote Data Protocol contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when non-encrypted data checksums are sent, which may allow cryptographic recovery of the session data information, resulting in a loss of confidentiality.

- 时间线

2002-09-16 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability in Microsoft Security Bulletin MS02-051.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Windows RDP Keystroke Injection Vulnerability
Design Error 5712
Yes No
2002-09-16 12:00:00 2009-07-11 05:06:00
Discovery of this issue is credited to Ben Cohen and Pete Chown of Skygate Technology Ltd.

- 受影响的程序版本

Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows 2000 Terminal Services SP3
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Terminal Services SP2
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Terminal Services SP1
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Terminal Services
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Server
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server
Microsoft Windows .NET Standard Server Beta 3
Microsoft RDP 5.1
+ Microsoft Windows XP 64-bit Edition SP1
+ Microsoft Windows XP 64-bit Edition SP1
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP 64-bit Edition
+ Microsoft Windows XP Home SP1
+ Microsoft Windows XP Home SP1
+ Microsoft Windows XP Home
+ Microsoft Windows XP Home
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional
Microsoft RDP 5.0
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Professional SP3
+ Microsoft Windows 2000 Professional SP3
+ Microsoft Windows 2000 Professional SP2
+ Microsoft Windows 2000 Professional SP2
+ Microsoft Windows 2000 Professional SP1
+ Microsoft Windows 2000 Professional SP1
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 2000 Server SP3
+ Microsoft Windows 2000 Server SP3
+ Microsoft Windows 2000 Server SP2
+ Microsoft Windows 2000 Server SP2
+ Microsoft Windows 2000 Server SP1
+ Microsoft Windows 2000 Server SP1
+ Microsoft Windows 2000 Server
+ Microsoft Windows 2000 Server
+ Microsoft Windows 2000 Terminal Services SP3
+ Microsoft Windows 2000 Terminal Services SP3
+ Microsoft Windows 2000 Terminal Services SP2
+ Microsoft Windows 2000 Terminal Services SP2
+ Microsoft Windows 2000 Terminal Services SP1
+ Microsoft Windows 2000 Terminal Services SP1
+ Microsoft Windows 2000 Terminal Services
+ Microsoft Windows 2000 Terminal Services

- 漏洞讨论

Microsoft Windows Remote Desktop Protocol (RDP) version 5.0 introduced a feature which may potentially be abused by remote attackers with the ability to intercept network traffic.

When common commands and input events are sent during a RDP session, a checksum is added to each packet which is derived from the event. In older versions of RDP, the checksum also included a timestamp, which meant that each packet had a different checksum.

Versions 5.0 of Microsoft Windows RDP introduced support for abbreviating packets for common commands and input events. A unique timestamp is not used when the checksum is calculated for version 5.0 RDP packets, making it possible to deduce particular events (such as individual keystrokes) based on the checksum. This issue is also present in RDP 5.1.

Given the ability to observe network traffic and deduce which events are occurring, it is possible for an attacker to inject maliciously crafted packets into a session which may cause certain events to occur.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Microsoft has released patches:


Microsoft Windows 2000 Professional

Microsoft Windows 2000 Server SP2

Microsoft Windows 2000 Advanced Server SP3

Microsoft Windows 2000 Advanced Server SP1

Microsoft Windows 2000 Advanced Server SP2

Microsoft Windows 2000 Datacenter Server SP3

Microsoft Windows 2000 Terminal Services SP3

Microsoft Windows 2000 Professional SP1

Microsoft RDP 5.0

Microsoft Windows 2000 Server SP3

Microsoft RDP 5.1

Microsoft Windows 2000 Datacenter Server SP2

Microsoft Windows 2000 Terminal Services SP2

Microsoft Windows 2000 Server SP1

Microsoft Windows 2000 Professional SP3

Microsoft Windows XP Professional

Microsoft Windows 2000 Professional SP2

Microsoft Windows 2000 Terminal Services SP1

Microsoft Windows XP Professional SP1

Microsoft Windows 2000 Advanced Server

Microsoft Windows 2000 Terminal Services

Microsoft Windows 2000 Server

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站