[SECURITY-L] [0_46534_AEE7C282-5BFD-4E84-98BC-79A14F27B03B_BR em Newsletters.Microsoft.com: Microsoft Security Bulletin MS03-012: Flaw In Winsock Proxy Service And ISA Server Firewall Service Can Cause Denial Of Service (331066)]

Silvana Mieko Misuta mieko em ccuec.unicamp.br
Qui Abr 10 09:17:50 -03 2003


----- Forwarded message from Microsoft <0_46534_AEE7C282-5BFD-4E84-98BC-79A14F27B03B_BR em Newsletters.Microsoft.com> -----

From: "Microsoft" <0_46534_AEE7C282-5BFD-4E84-98BC-79A14F27B03B_BR em Newsletters.Microsoft.com>
Subject: Microsoft Security Bulletin MS03-012: Flaw In Winsock Proxy Service And ISA Server Firewall Service Can Cause Denial Of Service (331066)
To: <mieko em ccuec.unicamp.br>
Date: Thu, 10 Apr 2003 02:37:07 -0700
X-Mailer: Microsoft CDO for Windows 2000

-----BEGIN PGP SIGNED MESSAGE-----

- -------------------------------------------------------------------

Title:      Flaw In Winsock Proxy Service And ISA Firewall Service 
	    Can Cause Denial Of Service (331066)
Date:       09 April 2003
Software:   Microsoft Proxy Server 2.0, Microsoft ISA Server 
Impact:     denial of service
Max Risk:   Important
Bulletin:   MS03-012

Microsoft encourages customers to review the Security Bulletins 
at: 

http://www.microsoft.com/technet/security/bulletin/MS03-012.asp
http://www.microsoft.com/security/security_bulletins/ms03-012.asp
- -------------------------------------------------------------------


Issue:
======
There is a flaw in the Winsock Proxy service in Microsoft Proxy 
Server 2.0, and the Microsoft Firewall service in ISA Server 2000, 
that would allow an attacker on the internal network to send a 
specially crafted packet that would cause the server to stop 
responding to internal and external requests. Receipt of such a 
packet would cause CPU utilization on the server to reach 100%, and 
thus make the server unresponsive. The Winsock Proxy service and 
Microsoft Firewall service work with FTP, telnet, mail, news, 
Internet Relay Chat (IRC), or other client applications that are 
compatible with Windows Sockets (Winsock). These services allow 
these applications to perform as if they were directly connected to 
the Internet. These services redirect the necessary communications 
functions to a Proxy Server 2.0 or ISA Server computer, thus 
establishing a communication path from the internal application to 
the Internet through it. 

Mitigating Factors:
====================

- - The vulnerability would not enable an attacker to gain any 
privileges on an affected Proxy Server 2.0 or ISA Server computer 
or compromise any cached content. It is strictly a denial of 
service.
 
- - ISA Server computers running in cache mode are not affected 
because the Microsoft Firewall service is disabled by default. 


Risk Rating:
============
Important

Patch Availability:
===================
A patch is available to fix this vulnerability. Please read the 
Security Bulletins at

http://www.microsoft.com/technet/security/bulletin/ms03-012.asp
http://www.microsoft.com/security/security_bulletins/ms03-12.asp

for information on obtaining this patch.

- ----------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT 
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING 
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS 
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, 
INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR 
SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS 
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME 
STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR 
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION 
MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPpRVY40ZSRQxA/UrAQG2pQf/Ul+QJaTR+qnbNvyp9Z9ypv2MS1ryDe6J
g+S1HMmVFGgs5T5k7I4xQBc7KjWsr6Hm7wVabItomQVyR7fc7pI9a1fNFkewyVw+
yHFIoOGaee3/vQ3eFRhEN8zPGXswgHB6Th3BWfk1qK51XxDQusywGXjzDRNRJlCb
hJbjs/HXt6Z+WqtbHE1uuoH92/+BgCIBqptIXgHcWRC7jzRGZNNoj8Z2vmw9EcWc
9xjtvlnGVNyy14GYwZvNevD3JoVLZ4AjCDvJj+D6d1nHHW3IXY12Pj3gyjIXWNhu
gvv6U6eTPBKCNO7/XkeAfy8e7tC2lkmVPvCYiIbIQVHxu3/aSYry5A==
=zsNm
-----END PGP SIGNATURE-----


*******************************************************************

You have received this e-mail bulletin because of your subscription to the Microsoft Product Security Notification Service.  For more information on this service, please visit http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please visit the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the Microsoft Security Notification Service via email as described below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.

----- End forwarded message -----


Mais detalhes sobre a lista de discussão SECURITY-L