{"vuid":"VU#939074","idnumber":"939074","name":"Microsoft Windows XP named pipe fails to restrict anonymous access","keywords":["Microsoft Server Service","information disclosure","named pipe","RestrictAnonymous","Srvsvc.dll"],"overview":"The Server service running on Microsoft Windows XP leaks authentication information.","clean_desc":"The Server service (srvsvc.dll) is a component of the Server Message Block (SMB), and its follow-on, Common Internet File System (CIFS). These are network protocols that Windows uses to share files, printers, serial ports, and communicate between computers. If the Server service is running on Microsoft Windows XP, a remote attacker may be able to access it anonymously via a named pipe. In addition, if that attacker supplies the service with a specially crafted message, they will receive a response that may allow them to determine what other users are accessing a shared resource. This vulnerability affects Microsoft Windows XP SP 1, Windows XP SP 2, and Windows XP 64-Bit Edition SP 1.","impact":"A remote, unauthenticated attacker may be able to access authentication information for users running Microsoft Windows XP.","resolution":"Apply Patch Microsoft has released Microsoft Security Bulletin MS05-007 to address this issue.","workarounds":"[<p>] Disable the Computer Browser Service Disabling the Computer service and restarting the affected system will help protect from remote attempts to exploit this vulnerability. Please see MS05-007 for details on how to disable the Computer Browser service.","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS05-007 Microsoft credits Jean-Baptiste Marchand with providing information regarding this issue.","author":"This document was written by Jeff Gennari based on information provided in Microsoft Security Bulletin MS05-007.","public":["http://www.microsoft.com/technet/security/Bulletin/MS05-007.mspx","http://support.microsoft.com/?kbid=188001"],"cveids":["CVE-2005-0051"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-08T19:18:00Z","publicdate":"2005-02-08T00:00:00Z","datefirstpublished":"2005-02-09T01:05:13Z","dateupdated":"2005-02-10T21:04:26Z","revision":57,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"18","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"4.86","cam_scorecurrentwidelyknown":"6.21","cam_scorecurrentwidelyknownexploited":"11.61","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.86,"vulnote":null}