25th Jul 2002 [SBWID-5552]
COMMAND
Microsoft Metadirectory services database remotely accessible vi ldap
by any user
SYSTEMS AFFECTED
Microsoft Metadirectory Services 2.2
PROBLEM
-----BEGIN PGP SIGNED MESSAGE-----
- ----------------------------------------------------------------------
Title: Authentication Flaw in Microsoft Metadirectory Services
Could Allow Privilege Elevation (Q317138)
Date: 24 July 2002
Software: Microsoft Metadirectory Services 2.2
Impact: Elevation of privilege
Max Risk: Medium
Bulletin: MS02-036
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-036.asp.
- ----------------------------------------------------------------------
Issue:
======
Microsoft Metadirectory Services (MMS) is a centralized metadirectory
service that provides connectivity, management, and interoperability
functions to help unify fragmented directory and database environments.
It enables enterprises to link together disparate data repositories
such as Exchange directory, Active Directory, third-party directory
services, and proprietary databases, for the purpose of ensuring that
the data in each is consistent, accurate, and can be centrally managed.
A flaw exists that could enable an unprivileged user to access and
manipulate data within MMS that should, by design, only be accessible
to MMS administrators. Specifically, it is possible for an unprivileged
user to connect to the MMS data repository via an LDAP client in such a
way as to bypass certain security checks. This could enable an attacker
to modify data within the MMS data repository, either for the purpose
of changing the MMS configuration or replicating bogus data to the
other data repositories.
Mitigating Factors:
====================
- If normal security practices have been followed, the
vulnerability could not be exploited from the Internet.
- The vulnerability could only be exploited by an attacker who had
significant technical expertise at a protocol level. The
vulnerability does not provide access to MMS itself, but rather to
the MMS data repository. Determining what data to change - and how
to change it - in order to cause a desired effect could be
quite difficult
- A successful attack would require a detailed understanding of the
specific way MMS had been configured, as well as information about
all of the other directories and database it was being used to
manage. It is likely that the vulnerability could only be
exploited by an attacker who had insider knowledge about the
enterprise.
Risk Rating:
============
- Internet systems: Moderate
- Intranet systems: Moderate
- Client systems: None
SOLUTION
Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-036.asp
for information on obtaining this patch.
Acknowledgment:
===============
- Pascal Huijbers and Thomas de Klerk of Info Support
http://www.infosupport.com/
- ---------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE
FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1
iQEVAwUBPT80F40ZSRQxA/UrAQGgxAgAlnVa6frQ0Y6ZU4epV2I/uDhI/lnghh05
D75xCzDZMzJGWRbWNcydBjjv/gccbHSwUksbe9IT7yS+6ukBEYoZzoi19AC6P57s
qYxO99oyO96uyxuwVzY/RMthoLuswBi2iAPm457runJwf8v9xgJzGOr3B9jJ0ETN
pBhi+qER33kb9EJkBMlqKUoaV5jIraU9MlSPiemmY103uVaR9VQ34FblZqAZhtUS
0t1EP6fxf1PdXCi1y5CtvsPyg+r4uRlYws4x0OegAnaR0P0TmKesq/blRPfeGBnl
Zxzr+LZZ8jCfLh+p0U4Bmn70c6526yaXbN+jJUVxPMVsGjNDzqutMQ==
=3gC3
-----END PGP SIGNATURE-----
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH