The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************
-----BEGIN PGP SIGNED MESSAGE-----
Microsoft Security Bulletin (MS00-070)
Patch Available for Multiple LPC and LPC Ports Vulnerabilities
Originally posted: October 03, 2000
Microsoft has released a patch that eliminates several security
vulnerabilities in Microsoft(r) Windows NT(r) 4.0 and Windows(r)
2000. The vulnerabilities could allow a range of effects, from denial
of service attacks to, in some cases, privilege elevation.
Frequently asked questions regarding this vulnerability and the
patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-070.asp.
Several vulnerabilities have been identified in the Windows NT 4.0
and Windows 2000 implementations of LPC and LPC ports:
Because LPC can only be used on the local machine, none of these
vulnerabilities could be exploited remotely. Instead, a malicious
user could only exploit them on machines that he could log onto
interactively. Typically, workstations and terminal servers would be
chiefly at risk, because, if normal security practices have been
followed, normal users will not be allowed to log onto critical
servers interactively. This also means that, even in the worst case,
the vulnerability would only confer additional local - not domain -
privileges on the malicious user.
Note: The Windows NT 4.0 patch can be installed on systems running
Service Pack 6a, and will be included in Service Pack 7. The Windows
2000 patch can be installed on systems with or without Service Pack
1, and will be included in Service Pack 2.
Note: Additional security patches are available at the Microsoft
Download Center
Please see the following references for more information related to
this issue.
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp.
Microsoft thanks BindView's Razor Team (http://razor.bindview.com)
for reporting these issues to us and helping us protect our
customers. The issues involved in these vulnerabilities required
several months of detailed engineering, and BindView worked closely
with us throughout the process. We'd like to thank them for their
ongoing commitment to responsible reporting practices.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.
Last Updated October 03, 2000
(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.
-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3
iQEVAwUBOdptcI0ZSRQxA/UrAQH2Jgf+INzTccmFKM66Zhg+nvVrH1QnqitGde6u
yBrXlhJZLp+6n+Fl8CdvueEwL6sfpiltbHYJ/JyqvdFvJN7TLdDWa2gNfcoZh1is
F4HklQSZvdb+ddQwS7rBiLV0RwNzYLPVabxxRk/TnHqA8PFaZXy+Sd9/ygGhIgss
9SKFaCrLRaGM2p6vL/pTSrmv7Kup6g5qg7e8kK9H6aGXxw0XXic4RH0YEBROX3Oq
3o9QPfbfcqFr5dr8utixTsXBSlZRa6si27NzQRvglka/GrJPF9YTUodfQUYwr9mI
CAPJBPS1Uu9AyraKyD9bzNpvju53YoOeJU11dgYqBH4CsB8WX3u5CA==
=xASC
-----END PGP SIGNATURE-----
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to [email protected]
The subject line and message body are not used in processing the request,
and can be anything you like.
To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.
For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.