CVE-2002-0864
CVSS5.0
发布时间 :2002-10-11 00:00:00
修订时间 :2016-10-17 22:22:48
NMCOS    

[原文]The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop."


[CNNVD]Microsoft Windows XP Professional远程桌面拒绝服务攻击漏洞(CNNVD-200210-254)

        
        远程桌面是Windows XP专业版的单用户RDP服务(Terminal Services)。
        Windows XP专业版远程桌面服务存在漏洞,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        在启动协议的时候客户端和服务器会进行图形处理能力进行协商,发送的包中包含PDU Confirm Active数据单元,这个段的32字节允许客户端设置选项如在不支持画图(drawing)命令的情况下关闭这个命令。
        其中之一的判断是是否发送图案BLT命令,在Windows 2000 Server中,关闭这个命令可以让服务端发送bitmaps来代替图案BLT命令,但是当发送在包中指定图案BLT命令给Windows XP专业版时,会导致Windows XP专业版系统在为登录屏幕进行着色图案操作时崩溃,产生拒绝服务。
        这个问题也存在于Microsoft Windows .NET Standard Server Beta 3系统中。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::sp1:home
cpe:/o:microsoft:windows_2000_terminal_services::sp3
cpe:/o:microsoft:windows_2000::sp3:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP3
cpe:/o:microsoft:windows_2000_terminal_services::sp1
cpe:/o:microsoft:windows_xp::sp1:64-bit
cpe:/o:microsoft:windows_2000::sp1:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP1
cpe:/o:microsoft:windows_2000::sp2:datacenter_serverMicrosoft Windows 2000 Datacenter Server SP2
cpe:/a:microsoft:.net_windows_server:beta3::standard
cpe:/o:microsoft:windows_2000_terminal_services
cpe:/o:microsoft:windows_2000:::advanced_server
cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold
cpe:/o:microsoft:windows_2000::sp3:professionalMicrosoft Windows 2000 Professional SP3
cpe:/o:microsoft:windows_2000_terminal_services::sp2
cpe:/o:microsoft:windows_2000::sp1:professionalMicrosoft Windows 2000 Professional SP1
cpe:/o:microsoft:windows_2000::sp2:professionalMicrosoft Windows 2000 Professional SP2
cpe:/o:microsoft:windows_2000:::datacenter_server
cpe:/o:microsoft:windows_2000::sp3:advanced_serverMicrosoft Windows 2000 Advanced Server SP3
cpe:/o:microsoft:windows_2000::sp2:advanced_serverMicrosoft Windows 2000 Advanced Server SP2
cpe:/o:microsoft:windows_2000::sp1:advanced_serverMicrosoft Windows 2000 Advanced Server SP1
cpe:/o:microsoft:windows_2000::sp1:serverMicrosoft Windows 2000 Server SP1
cpe:/o:microsoft:windows_2000::sp3:serverMicrosoft Windows 2000 Server SP3
cpe:/o:microsoft:windows_xp:::64-bit
cpe:/o:microsoft:windows_2000:::server
cpe:/o:microsoft:windows_2000:::professional
cpe:/o:microsoft:windows_xp:::home
cpe:/o:microsoft:windows_2000::sp2:serverMicrosoft Windows 2000 Server SP2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0864
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0864
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-254
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=103235745116592&w=2
(UNKNOWN)  BUGTRAQ  20020916 Microsoft Windows XP Remote Desktop denial of service vulnerability
http://marc.info/?l=bugtraq&m=103236181522253&w=2
(UNKNOWN)  BUGTRAQ  20020918 Microsoft Windows Terminal Services vulnerabilities
http://www.iss.net/security_center/static/10120.php
(VENDOR_ADVISORY)  XF  winxp-remote-desktop-dos(10120)
http://www.microsoft.com/technet/security/bulletin/ms02-051.asp
(VENDOR_ADVISORY)  MS  MS02-051
http://www.securityfocus.com/bid/5713
(VENDOR_ADVISORY)  BID  5713

- 漏洞信息

Microsoft Windows XP Professional远程桌面拒绝服务攻击漏洞
中危 其他
2002-10-11 00:00:00 2005-10-12 00:00:00
远程  
        
        远程桌面是Windows XP专业版的单用户RDP服务(Terminal Services)。
        Windows XP专业版远程桌面服务存在漏洞,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        在启动协议的时候客户端和服务器会进行图形处理能力进行协商,发送的包中包含PDU Confirm Active数据单元,这个段的32字节允许客户端设置选项如在不支持画图(drawing)命令的情况下关闭这个命令。
        其中之一的判断是是否发送图案BLT命令,在Windows 2000 Server中,关闭这个命令可以让服务端发送bitmaps来代替图案BLT命令,但是当发送在包中指定图案BLT命令给Windows XP专业版时,会导致Windows XP专业版系统在为登录屏幕进行着色图案操作时崩溃,产生拒绝服务。
        这个问题也存在于Microsoft Windows .NET Standard Server Beta 3系统中。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 关闭使用远程桌面。
        厂商补丁:
        Microsoft
        ---------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Microsoft Upgrade Windows XP Service Pack 1
        
        http://www.microsoft.com/WindowsXP/pro/downloads/servicepacks/sp1/default.asp

- 漏洞信息

13421
Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-09-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows XP Professional Remote Desktop Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 5713
Yes No
2002-09-16 12:00:00 2009-07-11 05:06:00
Discovery of this issue is credited to Ben Cohen and Pete Chown of Skygate Technology Ltd.

- 受影响的程序版本

Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition
Microsoft Windows 2000 Terminal Services SP3
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Terminal Services SP2
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Terminal Services SP1
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Terminal Services
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Server
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server
Microsoft Windows .NET Standard Server Beta 3
Microsoft Windows XP Professional SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP 64-bit Edition SP1

- 不受影响的程序版本

Microsoft Windows XP Professional SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP 64-bit Edition SP1

- 漏洞讨论

The Microsoft Windows XP Professional Remote Desktop implementation is prone to a denial of service.

It is possible for a malicious client to trigger this condition by sending a maliciously crafted packet to the vulnerable host during the negotiation of client/server graphics capabilities. Clients may specify drawing commands based on what is supported. If the Pattern BLT command is specified in a packet, Microsoft Windows XP Professional will crash when it tries to render the pattern.

This issue also exists in Microsoft Windows .NET Standard Server Beta 3.

- 漏洞利用

The following exploit information was provided:

Shown below is the unencrypted packet contents for the problematic PDU
Confirm Active packet. The only change is from 01 to 00 on the line
indicated.

c4 01 13 00 f0 03 ea 03 01 00 ea 03 06 00 ae 01
4d 53 54 53 43 00 11 00 00 00 01 00 18 00 01 00
03 00 00 02 00 00 00 00 05 04 00 00 00 00 00 00
00 00 02 00 1c 00 08 00 01 00 01 00 01 00 00 05
00 04 00 00 01 00 01 00 00 00 01 00 00 00 03 00
58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 01 00 14 00 00 00 01 00 00 00
2a 00 01 00 01 01 01 00 00 01 01 01 00 01 00 00 <- was "2a 00 01 01"
00 01 01 01 01 01 01 01 01 00 01 01 01 00 00 00
00 00 a1 06 00 00 00 00 00 00 00 84 03 00 00 00
00 00 e4 04 00 00 13 00 28 00 01 00 00 03 78 00
00 00 78 00 00 00 f3 09 00 80 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00
08 00 06 00 00 00 07 00 0c 00 00 00 00 00 00 00
00 00 05 00 0c 00 00 00 00 00 02 00 02 00 08 00
0a 00 01 00 14 00 15 00 09 00 08 00 00 00 00 00
0d 00 58 00 05 00 08 00 09 08 00 00 04 00 00 00
00 00 00 00 0c 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 0c 00 08 00 01 00 00 00
0e 00 08 00 01 00 00 00 10 00 34 00 fe 00 04 00
fe 00 04 00 fe 00 08 00 fe 00 08 00 fe 00 10 00
fe 00 20 00 fe 00 40 00 fe 00 80 00 fe 00 00 01
40 00 00 08 00 01 00 01 03 00 00 00 0f 00 08 00
01 00 00 00 11 00 0c 00 01 00 00 00 00 0a 64 00
14 00 08 00 01 00 00 00 15 00 0c 00 01 00 00 00
00 0a 00 01

- 解决方案

Microsoft has released patches:


Microsoft Windows 2000 Professional

Microsoft Windows 2000 Server SP2

Microsoft Windows 2000 Advanced Server SP3

Microsoft Windows XP Home

Microsoft Windows 2000 Advanced Server SP1

Microsoft Windows XP Home SP1

Microsoft Windows 2000 Advanced Server SP2

Microsoft Windows 2000 Datacenter Server SP3

Microsoft Windows 2000 Terminal Services SP3

Microsoft Windows XP 64-bit Edition SP1

Microsoft Windows 2000 Professional SP1

Microsoft Windows 2000 Server SP3

Microsoft Windows XP 64-bit Edition

Microsoft Windows 2000 Datacenter Server SP2

Microsoft Windows 2000 Terminal Services SP2

Microsoft Windows 2000 Server SP1

Microsoft Windows 2000 Professional SP3

Microsoft Windows XP Professional

Microsoft Windows 2000 Professional SP2

Microsoft Windows 2000 Terminal Services SP1

Microsoft Windows XP Professional SP1

Microsoft Windows 2000 Advanced Server

Microsoft Windows 2000 Terminal Services

Microsoft Windows 2000 Server

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站