CERTA-2009-AVI-493
Vulnerability from certfr_avis

Une vulnérabilité dans Microsoft Active Directory permet à une personne malintentionnée de provoquer un déni de service à distance.

Description

Une erreur dans la gestion de la pile permet à une personne distante malintentionnée de provoquer un déni de service de Microsoft Active Directory lors de l'exécution de certains requêtes LDAP ou LDAPS. Cette vulnérabilité n'affecte que les contrôleurs de domaine exécutant Active Directory Application Mode (ADAM) ou Active Directory Lightweight Directory Service (AD LDS).

Solution

Se référer au bulletin de sécurité Microsoft MS09-066 pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2003 Édition x64 Service Pack 2 ;
Microsoft Windows Windows XP Professionel Édition x64 Service Pack 2 ;
Microsoft Windows Windows XP Service Pack 2 et 3 ;
Microsoft Windows Windows Server 2003 Service Pack 2 pour systèmes Itanium ;
Microsoft Windows Windows Server 2008 pour systèmes 32 bits et Windows Server 2008 pour systèmes 32 bits Service Pack 2 ;
Microsoft Windows Windows Server 2008 pour systèmes x64 et Windows Server 2008 pour systèmes x64 Service Pack 2.
Microsoft Windows Windows Server 2003 Service Pack 2 ;
Microsoft Windows Microsoft Windows 2000 Service Pack 4 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2003 \u00c9dition x64 Service Pack 2 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows XP Professionel \u00c9dition x64 Service Pack 2 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows XP Service Pack 2 et 3 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2003 Service Pack 2 pour syst\u00e8mes Itanium ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits et Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 et Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2.",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2003 Service Pack 2 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Microsoft Windows 2000 Service Pack 4 ;",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne erreur dans la gestion de la pile permet \u00e0 une personne distante\nmalintentionn\u00e9e de provoquer un d\u00e9ni de service de Microsoft Active\nDirectory lors de l\u0027ex\u00e9cution de certains requ\u00eates LDAP ou LDAPS. Cette\nvuln\u00e9rabilit\u00e9 n\u0027affecte que les contr\u00f4leurs de domaine ex\u00e9cutant Active\nDirectory Application Mode (ADAM) ou Active Directory Lightweight\nDirectory Service (AD LDS).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Microsoft MS09-066 pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-1928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1928"
    }
  ],
  "initial_release_date": "2009-11-10T00:00:00",
  "last_revision_date": "2009-11-10T00:00:00",
  "links": [],
  "reference": "CERTA-2009-AVI-493",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-11-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans Microsoft Active Directory permet \u00e0 une personne\nmalintentionn\u00e9e de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Active Directory",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS09-066 du 10 novembre 2009",
      "url": "http://www.microsoft.com/technet/security/Bulletin/MS09-066.mspx"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…