Microsoft Reports Critical Vulnerability in Windows 2000, XP

Microsoft Corp. reported a critical vulnerability in Windows 2000 and Windows XP on Thursday. The flaw results from an unchecked buffer in Microsoft's Point-to-Point Tunneling Protocol (PPTP) implementation in the two operating systems. An attacker could exploit the flaw to mount a denial of service attack.

The bulletin was one of three security bulletins released by Microsoft's security team on Thursday morning. The other newly patched vulnerabilities involve Internet Information Server and Windows 2000.

PPTP is a Virtual Private Networking technology natively supported in Windows 2000 and Windows XP. According to the bulletin, the unchecked buffer exists in a section of code that processes the control data used to establish, maintain and tear down PPTP connections.

An attacker would exploit the flaw by sending specially malformed PPTP control data to a server or workstation acting as a server. The attack could corrupt kernel memory and cause the system to fail. Rebooting restores normal operation. PPTP is not enabled by default on any Windows system so servers have to be configured to offer PPTP services to be vulnerable.

In a separate bulletin, four less serious vulnerabilities in IIS got patches. The most serious of the vulnerabilities makes it possible for applications on a server to gain system-level privileges. The patch for the flaws is cumulative, including all IIS-related fixes since Windows NT 4.0 Service Pack 6a.

The other security vulnerability, rated "moderate," by Microsoft is that default permissions in Windows 2000 could allow a Trojan horse program. Microsoft says the systems most at risk from this vulnerability is a workstation shared by several users. The attacker would need to be able to log on locally to load the Trojan horse.

So far this year, Microsoft has distributed 64 security bulletins for its products.

Click here to view Microsoft's new security bulletins:

  • Cumulative patch for IIS vulnerabilities,
  • Critical PPTP implementation flaw,
  • Trojan horse program execution.

  • About the Author

    Scott Bekker is editor in chief of Redmond Channel Partner magazine.


    • Microsoft Deprecating Windows To Go

      Microsoft plans to put an end to its Windows To Go product in the near future, according to a Friday support article.

    • Microsoft Releases Hyper-V Server 2019 After Long Delay

      Acknowledging that the release took "way too long," Microsoft has made Hyper-V Server 2019 available for download from the Microsoft Evaluation Center page.

    • Forklift Container

      A Better Way To Upgrade Hyper-V Storage

      It's time again for Brien to perform a major storage upgrade on his Hyper-V hosts. But this time, he's taking a new approach.

    • RAMBleed Side-Channel Attack Method Disclosed by Researchers

      Academic researchers this week published information about another side-channel attack method, called "RAMBleed," that can expose information from memory chips, including encryption key information.

    comments powered by Disqus

    Office 365 Watch

    Sign up for our newsletter.

    Terms and Privacy Policy consent

    I agree to this site's Privacy Policy.