Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Windows flaw reaches beyond XP [Remote crash attack.]
CNET News.com by way of ZDNet ^ | 18JUL05 | Joris Evers

Posted on 07/18/2005 4:38:07 PM PDT by familyop

A security flaw that could let an attacker remotely crash computers running Windows exists in several versions of the operating system, not just Windows XP.

Windows 2000, Windows XP and Windows Server 2003 are vulnerable to a denial-of-service attack that exploits a problem in the Remote Desktop Protocol, Microsoft said in an advisory on Saturday.

RDP is a protocol that enables remote access to Windows systems. Because of a flaw in the way Windows handles remote desktop requests, an attacker could crash a PC by sending a malformed remote request, Microsoft said.

The advisory was released after the security researcher who discovered the flaw last week flagged Windows XP as vulnerable. Microsoft confirmed the issue on Friday and published the advisory over the weekend.

Microsoft said it is working on a patch, but noted that it is not aware of any attacks that try to exploit the vulnerability. However, security experts at The SANS Institute on Saturday did notice an increase in port scanning activity on the network port used by RDP. That could be a sign that hackers are trying to look for targets.

While most Windows versions ship with RDP services disabled, Remote Desktop is turned on out-of-the-box in Windows XP Media Center Edition. Only computers using services that have RDP enabled are vulnerable, Microsoft said in its advisory.

Services with RDP include Terminal Services in Windows 2000 and Windows Server 2003, and Remote Desktop Sharing and Remote Assistance in Windows XP.

Until a patch is available, Microsoft suggests users block TCP port 3389 (the port used by RDP) on their firewall, disable Terminal Services or Remote Desktop if not required, or secure remote desktop connections using either Internet Protocol Security or a virtual private network connection.


TOPICS: Business/Economy; News/Current Events; Technical
KEYWORDS: 2000; 2003; attack; flaw; microhit; microsoft; port; remote; scan; security; server; vulnerability; windows; xp; yawn
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 07/18/2005 4:38:07 PM PDT by familyop
[ Post Reply | Private Reply | View Replies]

To: familyop

So just close 3389 at the firewall.


2 posted on 07/18/2005 4:44:13 PM PDT by DaGman
[ Post Reply | Private Reply | To 1 | View Replies]

To: familyop

Oh look, another serious flaw in Windows!


3 posted on 07/18/2005 4:55:31 PM PDT by ColumbusRep ([=- http://www.VillageVineyard.org <-- My Church -=])
[ Post Reply | Private Reply | To 1 | View Replies]

To: familyop
Oops!, maybe that's what that missed client call was about. Ya think I should check my voice mail?

Nah! They didn't call me for a whole year, and I've got them stabilized in the recovery room right now.

I need to freak them out with the rate hike first anyway...LOL!

4 posted on 07/18/2005 4:55:34 PM PDT by benjaminjjones
[ Post Reply | Private Reply | To 1 | View Replies]

To: familyop
While most Windows versions ship with RDP services disabled, Remote Desktop is turned on out-of-the-box in Windows XP Media Center Edition.

IOW, there are about six people in the world who might be vulnerable and not know it.

5 posted on 07/18/2005 4:56:43 PM PDT by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 1 | View Replies]

To: familyop

off topic,

do you get more attempts on your ports while on free republic?

looking at my firewall log seems to indicate so.


6 posted on 07/18/2005 4:57:46 PM PDT by ken21 (it takes a village to brainwash your child + to steal your property! /s)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DaGman
Alert!

Time for the weekly MS bashing session.  Will all the usual suspects report to this thread immediately.

How soon before someone uses the Micro$oft spelling?

Alert!

7 posted on 07/18/2005 4:58:24 PM PDT by softwarecreator (Facts are to liberals as holy water is to vampires)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ken21

I noticed the same thing.


8 posted on 07/18/2005 5:00:09 PM PDT by softwarecreator (Facts are to liberals as holy water is to vampires)
[ Post Reply | Private Reply | To 6 | View Replies]

To: familyop
Windows 2000, Windows XP and Windows Server 2003 are vulnerable

It looks like your computer is safe if you have upgraded to Win9x. I'm a little surprised by Win2K on the list, however, since Microsoft ususally has most of the holes patched 5 years out.

9 posted on 07/18/2005 5:21:28 PM PDT by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: softwarecreator
How soon before someone uses the Micro$oft spelling?

You mean it isn't spelled that way? BTW, you just used it!

LOL... Funny thought, what do you want to bet that M$ has actually has a tradmark that spelling?

10 posted on 07/18/2005 5:35:12 PM PDT by AFreeBird (your mileage may vary)
[ Post Reply | Private Reply | To 7 | View Replies]

To: softwarecreator

"Time for the weekly MS bashing session."

Hey, it's only fair. We show up at the Mac threads and put in our digs.


11 posted on 07/18/2005 5:39:31 PM PDT by avenir (Don't insult my intelligentness!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: familyop
Until a patch is available, Microsoft suggests users block TCP port 3389 (the port used by RDP) on their firewall, disable Terminal Services or Remote Desktop if not required, or secure remote desktop connections using either Internet Protocol Security or a virtual private network connection.

Or just buy an Apple....

12 posted on 07/18/2005 5:41:23 PM PDT by Quinotto (On matters of style swim with the current,on matters of principle stand like a rock-Thomas Jefferson)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DaGman
So just close 3389 at the firewall.

It should already be closed if you are not using Terminal Services.

I'm looking at the firewall log and don't see any hits on 3389. I'm wondering if this affects machines that only respond to secure connections.

13 posted on 07/18/2005 5:43:35 PM PDT by js1138 (e unum pluribus)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ken21
"do you get more attempts on your ports while on free republic?

looking at my firewall log seems to indicate so.
"

You shouldn't be. Only the webserver admin/webmaster should have access to records of your IP address(es), and looking IPs up in webserver stats takes time. I really doubt that any FR admin is scanning your ports.

It's more likely that more crackers are scanning ports on the Net in general while you're reading Free Republic pages, though. There are peak activity hours, so there are probably hours when port scans are more common.
14 posted on 07/18/2005 6:32:15 PM PDT by familyop ("Let us try" sounds better, don't you think? "Essayons" is so...Latin.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ken21

Are all of your ports being scanned at once, or are you seeing activity only through some of them?


15 posted on 07/18/2005 6:35:54 PM PDT by familyop ("Let us try" sounds better, don't you think? "Essayons" is so...Latin.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: familyop

The best thing to do is to change the port that you use RDP on.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp and change PortNumber to the port you want.

Note that this port is in hex, so you have to select decimal first, enter the port number (anything above 20000 should be fine) and select Hex again and save.


16 posted on 07/18/2005 6:39:33 PM PDT by Gaas
[ Post Reply | Private Reply | To 14 | View Replies]

To: Gaas

Maybe someone who understands how software is written can explain this to me. A Group or an individual writes this RDP portion of Windows, no one bothers to check and see if it is vulnerable?
If amateurs and punks can find these problems, what do the thousands of Microsoft software engineers do for a living? Why can't the same methods these punks use be used by the professionals and "experts" prior to the software even being released?


17 posted on 07/18/2005 7:04:27 PM PDT by Jonah Johansen ("Comming soon to a neighborhood near you")
[ Post Reply | Private Reply | To 16 | View Replies]

To: avenir
true.  Besides, it's a slow news day.
18 posted on 07/18/2005 7:56:51 PM PDT by softwarecreator (Facts are to liberals as holy water is to vampires)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Jonah Johansen
Because a person or group of persons, cannot possibly find every security flaw, it's impossible.  How can they guess every scenario that these "punks", as you call them, will throw at them.  We are talking about the most widely used software on the planet with thousands of hackers throwing everything they can at it, every minute of the day.  
19 posted on 07/18/2005 8:00:23 PM PDT by softwarecreator (Facts are to liberals as holy water is to vampires)
[ Post Reply | Private Reply | To 17 | View Replies]

To: AFreeBird
Funny thought, what do you want to bet that M$ has actually has a tradmark that spelling?

Hahahaha ... you are probably right!!

20 posted on 07/18/2005 8:01:41 PM PDT by softwarecreator (Facts are to liberals as holy water is to vampires)
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson