Flaw leaves Windows open to DOS attack, Microsoft warns
IDG News Service - A flaw in software code that implements a protocol for virtual private networks (VPN) makes Windows 2000 and Windows XP systems vulnerable to denial-of-service attacks, Microsoft Corp. warned late yesterday.
An unchecked buffer exists in the code that implements the Point-to-Point Tunneling Protocol (PPTP), which enables users to create and use VPNs and is natively supported by Windows 2000 and Windows XP, Microsoft said in a security bulletin. The software maker called the problem "critical."
PPTP is an option in routing and remote access services in server versions of Windows 2000 and Windows XP, and part of the remote access client in workstation versions. Systems are only at risk if PPTP has been enabled, Microsoft said.
Both server and client systems are at risk, though an attack on a client would be more difficult because it typically changes its IP address every time a connection is set up, Microsoft said. An attacker could cause a vulnerable system to fail by sending malformed PPTP control data to the system, Microsoft said.
A patch to fix the problem is available from Microsoft's TechNet Web site. Administrators offering PPTP services should install the patch immediately, and users of remote access using PPTP should consider installing it, Microsoft said.
Microsoft warned in a separate security bulletin yesterday of another "moderate" security issue affecting Windows 2000.
The default permission settings for the software provide users in the "Everyone" group full access to the system root folder. An attacker could mount a Trojan horse attack against users on the same system by placing a program in the root folder and having it run when another user signs on, Microsoft said. Administrators should consider changing access permissions on the Windows 2000 root directory, Microsoft said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts