Thread-topic: [SA20637] Microsoft Windows RPC Mutual Authentication Vulnerability
>
> TITLE:
> Microsoft Windows RPC Mutual Authentication Vulnerability
>
> SECUNIA ADVISORY ID:
> SA20637
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Spoofing
>
> WHERE:
> From local network
>
> OPERATING SYSTEM:
> Microsoft Windows 2000 Advanced Server
>
> Microsoft Windows 2000 Datacenter Server
>
> Microsoft Windows 2000 Professional
>
> Microsoft Windows 2000 Server
>
>
> DESCRIPTION:
> A vulnerability has been reported in Microsoft Windows, which can be
> exploited by malicious people to spoof a valid RPC server.
>
> The vulnerability is caused due to an error within the handling of
> RPC mutual authentication. This can be exploited to cause custom RPC
> clients to incorrectly validate the identity of the RPC server, which
> potentially allows a malicious RPC server to impersonate a valid
> service.
>
> Successful exploitation requires that RPC clients use SSL with mutual
> authentication option enabled and that a user e.g. is tricked into
> connecting to a malicious RPC server.
>
> SOLUTION:
> Apply patch.
>
> Microsoft Windows 2000 SP4:
>
> 956-7d8d-4241-9ca2-107ce4f8c093
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Michael Colson of Symantec.
>
> ORIGINAL ADVISORY:
> MS06-031 (KB917736):
>
>