A security bug in a network service that ships as part of Windows NT 4.0, Windows 2000 and Windows XP can open systems up to attack, Microsoft warned in its first security bulletin of the year, issued yesterday and rated "critical".
The software vendor also issued the second and third bulletins of 2003 at the same time. Bulletin MS03-002 detailed a flaw in Content Management Server 2001 rated "important" and MS03-003 offered a patch for a "moderate" vulnerability in Outlook 2002.
The "critical" flaw lay in the Microsoft Locator service, software used to map easy-to-remember logical names of systems on a company's network, such as a print server, to the actual network addresses, Microsoft said in security bulletin MS03-001. (http://www.microsoft.com/technet/security/bulletin/MS03-001.asp)
By default, the Locator service is enabled only on Windows 2000 and Windows NT 4.0 server configurations used as domain controllers. It was not enabled on Windows NT 4.0 workstations or servers, on Windows 2000 workstations or servers, or on Windows XP, Microsoft said.
An attacker could take over a vulnerable system by sending a malformed request to the Locator service, Microsoft said. However, a firewall set to block external NetBIOS traffic would prevent attacks from the Internet.
Nevertheless, Microsoft urged users of all the affected operating systems to apply the available software patch. Administrators of Windows 2000 and Windows NT 4.0 domain controllers should apply the patch immediately, Microsoft said.
Users can check to see whether the Locator service is running on their system by typing "net start" at the command line. The Locator service is running if the entry "Remote Procedure Call (RPC) Locator" appears in the displayed the list of services.
Bulletin MS03-002 details a serious flaw in Content Management Server 2001, a product used to build and manage Web sites. It contains a flaw that could allow an attacker to intercept data that an Internet user shares with a site created using the Microsoft software and alter the data shown to the user. (http://www.microsoft.com/technet/security/bulletin/MS03-002.asp)
To exploit the flaw, an attacker would have to make a user visit the target site through a link that adds malicious script. This could be done by sending that link in an e-mail, Microsoft said. Content Management Server 2002 is not affected.
Finally, MS03-003 discusses a flaw in the way Outlook 2002 handles V1 Exchange Server Security Certificates for e-mail encryption. As a result of this flaw, Outlook does not correctly encrypt mail when such certificates are selected and sends plain text messages instead of secured messages, Microsoft said. (http://www.microsoft.com/technet/security/bulletin/MS03-003.asp")
The scope of this vulnerability was limited because V1 Exchange Server Security certificates were not commonly used, Microsoft said. Outlook 2002 by default uses the widely used S/MIME certificates.
Microsoft changed the way it rates security issues late last year. Under the new system, fewer bulletins get the "critical" stamp. Only vulnerabilities that could be exploited to allow malicious Internet worms to spread without user action are now rated critical. Many issues that were previously rated critical are now "important," a new category in the rating system. These "important" vulnerabilities could still expose user data or threaten system resources.