Windows 2000 DCOM clients may leak sensitive information onto the network

From: Todd Sabin (tsabinat_private)
Date: Tue Apr 02 2002 - 13:15:53 PST

  • Next message: GreyMagic Software: "Reading portions of local files in IE, depending on structure (GM#004-IE)"

    BindView Security Advisory
    --------
    
    Windows 2000 DCOM clients may leak sensitive information onto the network
    Issue Date: April 2, 2002
    Contact:  tsabinat_private
    
    Topic:
    Windows 2000 DCOM system may leak sensitive data onto the network
    
    Overview:
    Due to a flaw in Windows 2000's DCOM layer, arbitrary parts of a DCOM
    client's memory may be sent onto the network in plaintext.  The data
    may be anything from relatively harmless information like the
    process's environment block, to very sensitive information including
    passwords.
    
    
    Affected Systems:
    Windows 2000 systems using DCOM, up to and including SP2
    
    
    Impact:
    Windows 2000 systems using DCOM are at risk of leaking information.
    The exact ramifications depend on the characteristics of the individual
    DCOM programs.
    
    Details:
    
    DCOM is done with extensions built on top of the normal DCE RPC
    mechanisms built into Windows.  When a client wishes to make requests
    to a server, it first connects to the server.  It then has to tell the
    server what RPC interface it wants to use.  The first time it does
    this on a given connection, it does this by making a 'bind' request to
    the server.  If the client wants to use additional interfaces with the
    same connection, it can do that by making an 'alter context' request
    to the server.  Due to the nature of DCOM, clients usually make a
    significant number of alter context requests throughout their lifetime
    to talk to multiple DCOM interfaces on the server.
    
    The problem is that the 'alter context' calls, in addition to sending
    the proper request data, follow it with a large block of the client's
    memory space.  The extra data is roughly 1000 bytes in size, and is
    normally ignored by the server, so it doesn't cause functionality
    problems most of the time.  However, it does leak potentially
    sensitive information onto the network.
    
    The specific case which caused a password to be sent onto the network
    was this: On W2K SP1, start an empty mmc.exe.  Add in a WMI Control
    snap-in.  Configure it to connect to another computer, and use the
    'Log on as' dialog to specify credentials.  Then get the properties
    from the remote machine.  This lead, in our case, to the supplied
    password being leaked onto the network in plaintext.  This didn't
    occur every time, but happened on several different occasions.
    
    DCOM traffic is not limited to any particular port, but is usually
    done over ports 135, and dynamic ports from 1024 to 5000.
    
    
    Vendor Response:
    
    Microsoft has been informed of this issue, and has a fix for it, but
    they did not feel the risk is significant enough to warrant releasing a
    hotfix.  Their knowledge base article can be found at
    http://support.microsoft.com/default.aspx?scid=kb;EN-US;q300367
    
    The fix is included in the Windows 2000 SRP1.
    
    Workarounds:
    Disable DCOM on all W2K machines.
    
    Recommendations:
    If you make significant use of DCOM on Windows 2000, obtain SRP1
    from Microsoft, and deploy it.
    
    References:
    
    Knowledge base article:
    http://support.microsoft.com/default.aspx?scid=kb;EN-US;q300367
    
    W2K Security Rollup Patch 1:
    http://www.microsoft.com/windows2000/downloads/critical/q311401/default.asp
    



    This archive was generated by hypermail 2b30 : Tue Apr 02 2002 - 13:27:37 PST