Microsoft Reports Critical Vulnerability in Windows 2000, XP

Microsoft Corp. reported a critical vulnerability in Windows 2000 and Windows XP on Thursday. The flaw results from an unchecked buffer in Microsoft's Point-to-Point Tunneling Protocol (PPTP) implementation in the two operating systems. An attacker could exploit the flaw to mount a denial of service attack.

The bulletin was one of three security bulletins released by Microsoft's security team on Thursday morning. The other newly patched vulnerabilities involve Internet Information Server and Windows 2000.

PPTP is a Virtual Private Networking technology natively supported in Windows 2000 and Windows XP. According to the bulletin, the unchecked buffer exists in a section of code that processes the control data used to establish, maintain and tear down PPTP connections.

An attacker would exploit the flaw by sending specially malformed PPTP control data to a server or workstation acting as a server. The attack could corrupt kernel memory and cause the system to fail. Rebooting restores normal operation. PPTP is not enabled by default on any Windows system so servers have to be configured to offer PPTP services to be vulnerable.

In a separate bulletin, four less serious vulnerabilities in IIS got patches. The most serious of the vulnerabilities makes it possible for applications on a server to gain system-level privileges. The patch for the flaws is cumulative, including all IIS-related fixes since Windows NT 4.0 Service Pack 6a.

The other security vulnerability, rated "moderate," by Microsoft is that default permissions in Windows 2000 could allow a Trojan horse program. Microsoft says the systems most at risk from this vulnerability is a workstation shared by several users. The attacker would need to be able to log on locally to load the Trojan horse.

So far this year, Microsoft has distributed 64 security bulletins for its products.

Click here to view Microsoft's new security bulletins:

  • Cumulative patch for IIS vulnerabilities,
  • Critical PPTP implementation flaw,
  • Trojan horse program execution.

  • About the Author

    Scott Bekker is editor in chief of Redmond Channel Partner magazine.


    • Spaceflight Training in the Middle of a Pandemic

      Surprisingly, the worldwide COVID-19 lockdown has hardly slowed down the space training process for Brien. In fact, it has accelerated it.

    • Surface and ARM: Why Microsoft Shouldn't Follow Apple's Lead and Dump Intel

      Microsoft's current Surface flagship, the Surface Pro X, already runs on ARM. But as the ill-fated Surface RT showed, going all-in on ARM never did Microsoft many favors.

    • IT Security Isn't Supposed To Be Easy

      Joey explains why it's worth it to endure a little inconvenience for the long-term benefits of a password manager and multifactor authentication.

    • Microsoft Makes It Easier To Self-Provision PCs via Windows Autopilot When VPNs Are Used

      Microsoft announced this week that the Windows Autopilot service used with Microsoft Intune now supports enrolling devices, even in cases where virtual private networks (VPNs) might get in the way.

    comments powered by Disqus

    Office 365 Watch

    Sign up for our newsletter.

    Terms and Privacy Policy consent

    I agree to this site's Privacy Policy.