Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Todd Sabin (tsabinrazor.bindview.com)
Date: Tue Apr 02 2002 - 15:15:53 CST
BindView Security Advisory
Windows 2000 DCOM clients may leak sensitive information onto the network
Issue Date: April 2, 2002
Windows 2000 DCOM system may leak sensitive data onto the network
Due to a flaw in Windows 2000's DCOM layer, arbitrary parts of a DCOM
client's memory may be sent onto the network in plaintext. The data
may be anything from relatively harmless information like the
process's environment block, to very sensitive information including
Windows 2000 systems using DCOM, up to and including SP2
Windows 2000 systems using DCOM are at risk of leaking information.
The exact ramifications depend on the characteristics of the individual
DCOM is done with extensions built on top of the normal DCE RPC
mechanisms built into Windows. When a client wishes to make requests
to a server, it first connects to the server. It then has to tell the
server what RPC interface it wants to use. The first time it does
this on a given connection, it does this by making a 'bind' request to
the server. If the client wants to use additional interfaces with the
same connection, it can do that by making an 'alter context' request
to the server. Due to the nature of DCOM, clients usually make a
significant number of alter context requests throughout their lifetime
to talk to multiple DCOM interfaces on the server.
The problem is that the 'alter context' calls, in addition to sending
the proper request data, follow it with a large block of the client's
memory space. The extra data is roughly 1000 bytes in size, and is
normally ignored by the server, so it doesn't cause functionality
problems most of the time. However, it does leak potentially
sensitive information onto the network.
The specific case which caused a password to be sent onto the network
was this: On W2K SP1, start an empty mmc.exe. Add in a WMI Control
snap-in. Configure it to connect to another computer, and use the
'Log on as' dialog to specify credentials. Then get the properties
from the remote machine. This lead, in our case, to the supplied
password being leaked onto the network in plaintext. This didn't
occur every time, but happened on several different occasions.
DCOM traffic is not limited to any particular port, but is usually
done over ports 135, and dynamic ports from 1024 to 5000.
Microsoft has been informed of this issue, and has a fix for it, but
they did not feel the risk is significant enough to warrant releasing a
hotfix. Their knowledge base article can be found at
The fix is included in the Windows 2000 SRP1.
Disable DCOM on all W2K machines.
If you make significant use of DCOM on Windows 2000, obtain SRP1
from Microsoft, and deploy it.
Knowledge base article:
W2K Security Rollup Patch 1: