From Russ.Cooper@RC.ON.CA Tue Aug  9 14:08:15 2005
From: Russ <Russ.Cooper@RC.ON.CA>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Date: Tue, 9 Aug 2005 14:01:26 -0400
Reply-To: Windows NTBugtraq Mailing List <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>
Subject: Alert: Microsoft Security Bulletin MS05-042 - Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)

Microsoft Security Bulletin MS05-042:
Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)

Bulletin URL:
<http://www.microsoft.com/technet/security/Bulletin/MS05-042.mspx>

Version Number: 1.0
Issued Date: Tuesday, August 09, 2005
Impact of Vulnerability: Denial of Service, Information Disclosure, and Spoofing.
Maximum Severity Rating: Moderate
Patch(es) Replaced: None
Caveats: None

Tested Software:
Affected Software:
------------------
* Microsoft Windows 2000 Service Pack 4
<http://tinyurl.com/76lgw>
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
<http://tinyurl.com/aocy3>
* Microsoft Windows XP Professional x64 Edition
<http://tinyurl.com/8wx9y>
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
<http://tinyurl.com/cgnq5>
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
<http://tinyurl.com/dctm6>
* Microsoft Windows Server 2003 x64 Edition Windows Server 2003 (all versions)
<http://tinyurl.com/b5vfk>

Technical Description:
----------------------
* Kerberos Vulnerability - CAN-2005-1981: A denial of service vulnerability exists that could allow an attacker to send a specially crafted message to a Windows domain controller that could cause the service that is responsible for authenticating users in an Active Directory domain to stop responding.

* PKINIT Vulnerability - CAN-2005-1982: This is an information disclosure and spoofing vulnerability. This vulnerability could allow an attacker to tamper with certain information that is sent from a domain controller and potentially access sensitive client network communication. Users could believe they are accessing a trusted server when in reality they are accessing a malicious server. However, an attacker would first have to inject themselves into the middle of an authentication session between a client and a domain controller.

This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.2047.14260)

Cheers,
Russ Cooper - Senior Scientist - Cybertrust/NTBugtraq Editor

--
NTBugtraq Editor's Note:

Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
--
