Microsoft Windows 2000 and XP SMB signing group policy modification
|win-smb-policy-modification (10843)||Medium Risk|
A vulnerability the Server Message Block (SMB) signing function in Microsoft Windows 2000 and Windows XP could allow a remote attacker to disable SMB signing and modify group policy settings. SMB signing is an option available with Windows 2000 and Windows XP that is used to digitally sign all packets that are transmitted using the SMB protocol. If a remote attacker from within the local network is able to intercept and modify data as it is being exchanged between a client and server, the attacker could disable SMB signing and possibly change the group policy settings. An attacker could use this vulnerability to modify file and folder permissions, cause programs to be executed at system startup, and possibly perform other malicious actions on the vulnerable client.
Apply the appropriate patch for your system, as listed in the latest Microsoft Security Bulletin. See References.
— OR —
Use Microsoft Automatic Update if it is supported by your operating system. The original bulletin issued by Microsoft has been superceded.
- Microsoft Security Bulletin MS02-070: Flaw in SMB Signing Could Enable Group Policy to be Modified (309376).
- Microsoft Security Bulletin MS05-027: Vulnerability in Server Message Block Could Allow Remote Code Execution (896422).
- Microsoft Security Bulletin MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159).
- Microsoft Security Bulletin MS06-063: Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution (923414).
- Microsoft Security Bulletin MS08-063: Vulnerability in SMB Could Allow Remote Code Execution (957095).
- Microsoft Security Bulletin MS09-001: Vulnerabilities in SMB Could Allow Remote Code Execution (958687).
- Microsoft Security Bulletin MS10-012: Vulnerabilities in SMB Server Could Allow Remote Code Execution (971468).
- Microsoft Security Bulletin MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214).
- Microsoft Security Bulletin MS11-020: Vulnerability in SMB Server Could Allow Remote Code Execution (2508429).
- BID-6367: Microsoft Windows SMB Signing Vulnerability
- CVE-2002-1256: The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.
- OSVDB ID: 11799: Microsoft Windows SMB Signing Group Policy Modification
- Microsoft Windows 2000
- Microsoft Windows XP
Dec 11, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this