Microsoft Security Bulletin MS99-016 - Critical
Patch Available for "Malformed Phonebook Entry" Vulnerability
Published: May 19, 1999 | Updated: March 21, 2003
Patch Availability Information Updated: March 21, 2003
Originally Posted: May 20, 1999
Microsoft has released a patch that eliminates a vulnerability in the Microsoft® Windows NT® remote access service (RAS) client. The vulnerability could allow a denial-of-service attack to be mounted against the client machine or, under certain conditions, could allow arbitrary code to be executed on it.
A fully supported patch is available that eliminates this vulnerability, and Microsoft recommends that affected customers download and install it, if appropriate.
The component of the RAS client that processes phonebook entries has an unchecked buffer. This results in a vulnerability that poses two threats to safe operation. The first is a denial of service threat; a malformed phonebook entry could overflow the buffer, causing the RAS client service to crash. The second is more esoteric and would be far more difficult to exploit. A carefully-constructed phonebook entry could cause arbitrary code to execute on the client via a classic buffer overrun technique. Neither variant could be exploited accidentally.
It is important to stress that the vulnerability affects RAS client machines, not RAS servers, and that the user must have permission to add or modify phonebook entries in order to mount the attack. (Permissions can be set via the phonebook's ACL). The machines primarily at risk from this vulnerability are workstations that are configured to dial out to other systems, because servers, including terminal servers, are not typically configured to act as RAS clients. It also is important to note that this vulnerability would affect only the local machine; there is no capability to directly attack a remote machine via this vulnerability.
While there are no reports of customers being adversely affected by this vulnerability, Microsoft is proactively releasing this patch to allow customers to take appropriate action to protect themselves against it.
Affected Software Versions
- Microsoft Windows NT 4.0
Vulnerability Identifier: CVE-1999-0715
What Microsoft is Doing
Microsoft has released patches that fix the problem identified. The patches are available for download from the sites listed below in What Customers Should Do.
Microsoft also has sent this security bulletin to customers subscribing to the Microsoft Product Security Notification Service. See The Microsoft Product Security Notification Service for more information about this free customer service.
Microsoft has published the following Knowledge Base (KB) article on this issue:
- Microsoft Knowledge Base (KB) article 230677, Malformed Phonebook Entry Security Vulnerability in RAS Client, http://support.microsoft.com/default.aspx?scid=kb;en-us;230677&sd=tech
(Note It might take 24 hours from the original posting of this bulletin for the KB article to be visible in the Web-based Knowledge Base.)
What Customers Should Do
Microsoft highly recommends that customers evaluate the degree of risk that this vulnerability poses to their systems and determine whether to download and install the patch. The patch can be found at:
Please see the following references for more information related to this issue.
- Microsoft Security Bulletin MS99-016, Patch Available for ";Malformed Phonebook Entry"; Vulnerability, (The Web-posted version of this bulletin), http://www.microsoft.com/technet/security/bulletin/ms99-016.mspx.
- Microsoft Knowledge Base (KB) article 230677, Malformed Phonebook Entry Security Vulnerability in RAS Client, http://support.microsoft.com/default.aspx?scid=kb;en-us;230677&sd=tech.
Obtaining Support on this Issue
If you require technical assistance with this issue, please contact Microsoft Technical Support. For information on contacting Microsoft Technical Support, please see http://support.microsoft.com/contactussupport/?ws=support.
Microsoft acknowledges David Litchfield of Arca Systems for discovering this vulnerability and reporting it to us.
- May 19, 1999: Bulletin Created.
- V2.0 (March 21, 2003): Introduced versioning and updated patch availability information
For additional security-related information about Microsoft products, please visit http://www.microsoft.com/technet/security
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Built at 2014-04-18T13:49:36Z-07:00