发布时间 :2005-06-01 00:00:00
修订时间 :2008-09-05 16:50:06

[原文]Memory leak in Windows Management Instrumentation (WMI) service allows attackers to cause a denial of service (memory consumption and crash) by creating security contexts more quickly than they can be cleared from the RPC cache.

[CNNVD]Microsoft Windows XP 拒绝服务漏洞(CNNVD-200506-018)

        Microsoft Windows是微软发布的非常流行的操作系统。
        Microsoft Windows XP WMI服务的处理流程中存在问题,远程攻击者可能利用此漏洞执行拒绝服务攻击。
        如果用户使用了处理Windows管理规范(WMI)服务的程序的话,就会出现这个漏洞。出现这个漏洞时生成安全上下文的速度要高于清空缓存的速度,导致远程过程调用(RPC)缓存大量增加和内存泄漏,这样应用程序和操作系统变得没有响应,必须重启Windows XP工作站才能恢复正常状态。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_xp::gold:professionalMicrosoft Windows XP Professional Gold

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  BID  13801

- 漏洞信息

Microsoft Windows XP 拒绝服务漏洞
中危 其他
2005-06-01 00:00:00 2005-10-20 00:00:00
        Microsoft Windows是微软发布的非常流行的操作系统。
        Microsoft Windows XP WMI服务的处理流程中存在问题,远程攻击者可能利用此漏洞执行拒绝服务攻击。
        如果用户使用了处理Windows管理规范(WMI)服务的程序的话,就会出现这个漏洞。出现这个漏洞时生成安全上下文的速度要高于清空缓存的速度,导致远程过程调用(RPC)缓存大量增加和内存泄漏,这样应用程序和操作系统变得没有响应,必须重启Windows XP工作站才能恢复正常状态。

- 公告与补丁


- 漏洞信息

Microsoft Windows XP RPC Cache Memory Leak

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-12-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows XP Windows Management Instrumentation Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 13801
No Yes
2005-05-28 12:00:00 2009-07-12 02:56:00
Discovered by Juha-Matti Laurio <>.

- 受影响的程序版本

Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Home SP2
Microsoft Windows XP Home SP1
Microsoft Windows XP Home

- 漏洞讨论

Microsoft Windows XP is affected by a denial of service vulnerability.

An application can trigger this issue by generating excessive expired and unused security contexts resulting a failure of RPC cache to be freed.

A successful attack can allow a local attacker to trigger a denial of service condition. A restart is required to regain normal functionality.

Microsoft has identified this issue in Windows XP Professional and Windows XP Home Edition. Other versions may be affected as well. This BID will be updated when more details are available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Microsoft has released KB article 890196 to address this issue. Users are advised to contact the vendor and visit the following location for more information about obtaining fixes:;[LN];CNTACTMS

- 相关参考