{"vuid":"VU#594108","idnumber":"594108","name":"Microsoft Windows Active Directory fails to handle long LDAP requests","keywords":["Microsoft","Windows","Active Directory","LDAP version 3","AND statements","Lsass.exe","stack overflow"],"overview":"A flaw has been discovered in the way that Microsoft's Active Directory service handles large LDAP  requests. This flaw could result in a denial-of-service vulnerability.","clean_desc":"The directory services provided by Microsoft's Active Directory are based on the Lightweight Directory Access Protocol (LDAP). Active Directory objects can be stored and retrieved using standard LDAPv3 requests. Core Security Technologies has discovered a flaw in the way the Active Directory service handles long LDAP requests. This flaw occurs when an LDAP search request with more than 700 logical qualifiers (e.g., \"AND\" or \"OR\") is sent to the server. Exploitation of the flaw reportedly results in a stack overflow and subsequent crash of the Local Security Authority Sub-System (Lsass.exe) service. The death of the Lsass.exe process forces a shutdown of the Windows host system, resulting in a denial of service for the affected server.","impact":"Remote attackers may be able to crash the Active Directory server. This can result in a serious denial-of-service condition since the Active Directory service necessarily resides on Windows domain controllers. Unavailability of the domain controllers may affect normal operations within the domain.","resolution":"Microsoft has included a patch for this issue in Windows 2000 Service Pack 4. For additional information, users are encouraged to review the following Microsoft Knowledge Base Articles: 319709 - An Access Violation Occurs in Lsass Because of a Stack Overflow\n260910 - How to Obtain the Latest Windows 2000 Service Pack","workarounds":"Workarounds Block or restrict access to the Active Directory service (port 389/tcp) from untrusted networks such as the Internet. As a general rule, the CERT/CC recommends that sites block all types of network traffic from sources that are not explicitly required for normal operation.","sysaffected":"","thanks":"Thanks to \nCore Security Technologies\n for discovering, researching, and reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.coresecurity.com/common/showdoc.php?idx=351&idxseccion=10","http://support.microsoft.com/default.aspx?kbid=319709","http://www.securityfocus.com/bid/7930","http://www.secunia.com/advisories/9171/"],"cveids":["CVE-2003-0507"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-11T14:52:29Z","publicdate":"2003-07-02T00:00:00Z","datefirstpublished":"2003-07-17T15:13:23Z","dateupdated":"2003-07-23T15:01:32Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"13","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"14","cam_scorecurrent":"13.104","cam_scorecurrentwidelyknown":"13.104","cam_scorecurrentwidelyknownexploited":"21.294","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.104,"vulnote":null}