Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
Three new flaws were discovered in Microsoft products that could allow a malicious user to cause havoc on your machine.
The flaws were discovered in SQL Server 2000, Microsoft Exchange Server, and
Metadirectory Services 2.2, and would allow a hacker to accomplish a variety
of attacks.
The most serious threat comes from the vulnerability in the SQL Server 2000
resolution service, which could enable code execution by an attacker.
The vulnerability was identified Wednesday by David Litchfield of Next
Generation Security Software Ltd.
SQL Server 2000 introduces the ability to host multiple instances of
SQL Server on a single physical machine. Each instance operates for all
intents and purposes as though it was a separate server.
The multiple instances, however, cannot all use the standard SQL Server
session port (TCP 1433). While the default instance listens on TCP port
1433, named instances listen on any port assigned to them. The SQL Server
Resolution Service, which operates on UDP port 1434, provides a way for
clients to query for the appropriate network endpoints to use for a
particular SQL Server instance.
By sending a carefully crafted packet to the Resolution Service, an attacker
could cause portions of system memory to be overwritten. Overwriting it with
random data would likely result in the failure of the SQL Server service,
while overwriting it with carefully selected data could allow the attacker
to run code in the security context of the SQL Server service.
The vulnerability also could allow for a denial of service attack . SQL uses a keep-alive mechanism to distinguish between active and passive instances.
A hacker could cause a DoS by creating a keep-alive packet that, when sent
to the Resolution Service, would cause SQL Server 2000 to respond with the
same information. An attacker who created such a packet, spoofed the source
address so that it appeared to come from a one SQL Server 2000 system, and
sent it to a neighboring SQL Server 2000 system could cause the two systems
to enter a never-ending cycle of keep-alive packet exchanges.
A patch for the vulnerability is available here.
The second vulnerability, discovered by Internet Security Systems, effects
Microsoft Exchange Server v.5.5 Internet Mail Connector, which provides
Simple Mail Transfer Protocol functionality. It is possible
for remote attackers to formulate a request to trigger a buffer overflow on
a vulnerable Exchange server. This flaw may allow an attacker to either
crash Exchange and block all inbound and outbound e-mail delivery or allow an
attacker to gain complete control of the server.
Two major concerns regarding this vulnerability are the widespread
deployment of version 5.5 and the fact that successful exploitation of this
vulnerability can occur through properly configured firewalls.
A patch for the Exchange Server 5.5 vulnerability is available here.
The last vulnerability, discovered by Pascal Huijbers and Thomas de Klerk of
Info Support, appears to pose only a moderate threat. The vulnerability
occurs in Microsoft Metadirectory Services, a centralized metadirectory
service that provides connectivity, management, and interoperability
functions to help unify fragmented directory and database environments.
A flaw exists that could enable an unprivileged user to access and
manipulate data within MMS that should, by design, only be accessible to MMS
administrators. Specifically, it is possible for an unprivileged user to
connect to the MMS data repository via an LDAP client in such a way as to
bypass certain security checks. This could enable an attacker to modify data
within the MMS data repository, either for the purpose of changing the MMS
configuration or replicating bogus data to the other data repositories.
According to Microsoft’s security bulletin, an attack on MMS would be
extremely difficult. The bulletin notes that if normal security practices
have been followed, the vulnerability could not be exploited from the
Internet. In addition, the vulnerability could only be exploited by an
attacker who had significant technical expertise at a protocol level,
because the vulnerability does not provide access to MMS itself, but rather
to the MMS data repository. Determining what data to change, and how to
change it in order to cause a desired effect could be quite difficult.
The MMS vulnerability also appears to be only vulnerable to an attacker who
had insider knowledge about the specific enterprise, as a successful attack
would require a detailed understanding of the specific way MMS had been
configured, as well as information about all of the other directories and
database it was being used to manage.
A patch for the MMS vulnerability is available here.
The new vulnerabilities for Microsoft come in a year when the company’s software has
been plagued by various flaws. This year alone, the Redmond, Wash. giant has
acknowledged 39 vulnerabilities across their product line.
-
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
-
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
SEE ALL
ARTICLES