Bugtraq mailing list archives
Microsoft Security Bulletin (MS00-026)
From: secnotif () MICROSOFT COM (Microsoft Product Security)
Date: Thu, 20 Apr 2000 13:03:11 -0700
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** -----BEGIN PGP SIGNED MESSAGE----- Microsoft Security Bulletin (MS00-026) ====================================== Patch Available for "Mixed Object Access" Vulnerability Originally Posted: April 20, 2000 Summary - ------- Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) Windows(r) 2000 that could, under very specific conditions, allow a malicious user to change information in the Active Directory that he should not be able to change. Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-026.asp Issue ===== Active Directory allows for access control of directory objects on a per-attribute basis. However, the vulnerability at issue here could allow a malicious user to modify object attributes that he does not have permission to modify, as long as he combined the operation in a particular way with ones involving attributes that he does have permission to modify. The vulnerability does not afford the malicious user an opportunity to modify all objects in a class - only the specific class objects for which he has permission to modify at least one attribute. Further, the vulnerability provides no capability to bypass normal authentication or Windows 2000 auditing, so administrators could determine if this vulnerability were being exploited, and by whom. Affected Software Versions ========================== - Windows 2000 Server - Windows 2000 Advanced Server Note The vulnerability only affects the above products when they are used as domain controllers. Patch Availability ================== - http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20490 Note: Additional security patches are available at the Microsoft Download Center. More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-026, http://www.microsoft.com/technet/security/bulletin/fq00-026.asp - Microsoft Knowledge Base article Q259401 discusses this issue and will be available soon. - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Acknowledgments =============== Microsoft thanks Sebastien Malbois (mailto:smalbois () hotmail com) of Bouygues Construction (http://www.bouygues-construction.com/) for reporting this issue to us and working with us to protect customers. Revisions ========= - April 20, 2000: Bulletin Created. - ------------------------------------------------------------ THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last updated April 20, 2000 (c) 2000 Microsoft Corporation. All rights reserved. Terms of use. -----BEGIN PGP SIGNATURE----- Version: PGP 6.0.2 iQEVAwUBOP9ieY0ZSRQxA/UrAQEh/Qf+O14xaUpNFSVFMobaHTjwCpGC1t7RGOO9 xoAzgQuLI/7x3zXMHrktOMNCpAJbAPehrt5qQ375sqbWyjnmcUcWzYuXDv7ibU3d AlxvTPuatZFlvDizzOplncSb5PCADpDx3CF+LYnZ/EVL7dItFDqvGJJQRUdabqKA Xt981v3uo5ZuX4vJHlN4tsNx7zRQZjiJxZsXSlQDdEt5Mnul4Z1ENdKdqmEkd7lH oUJlHbnFVYpTsW3aW2H0kJlgAM2iLZnzQZDJ0HZkaVWAsjeoeirpAstWA62vHAut DJR5cQOhmp4GFmKOOFlflYr2TfZc2VjrbETfRr6o5soWqVjW5R/W1Q== =Q5ug -----END PGP SIGNATURE----- ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST () ANNOUNCE MICROSOFT COM The subject line and message body are not used in processing the request, and can be anything you like. To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/technet/security/notify.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
Current thread:
- IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy) Georgi Guninski (Apr 18)
- RFP2K03: Contemplations on dvwssr.dll and its affects on life rain forest puppy (Apr 20)
- Microsoft Security Bulletin (MS00-026) Microsoft Product Security (Apr 20)
- Re: IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy) TAKAGI, Hiromitsu (Apr 20)
- freebsd libncurses overflow Przemyslaw Frasunek (Apr 24)
- Re: freebsd libncurses overflow Kris Kennaway (Apr 24)
- Re: freebsd libncurses overflow Kris Kennaway (Apr 24)
- Re: freebsd libncurses overflow Przemyslaw Frasunek (Apr 25)
- freebsd libncurses overflow Przemyslaw Frasunek (Apr 24)
- Re: freebsd libncurses overflow Bill Fumerola (Apr 24)
- Re: freebsd libncurses overflow Theo de Raadt (Apr 26)
- Denial of Service Against pcAnywhere. Vacuum (Apr 25)