Vulnerabilities > CVE-2004-0899 - Unspecified vulnerability in Microsoft Windows NT 4.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 40 |
Nessus
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS04-042.NASL description The remote host has the Windows DHCP server installed. There is a flaw in the remote version of this server that could allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 15965 published 2004-12-14 reporter This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15965 title MS04-042: Windows NT Multiple DHCP Vulnerabilities (885249) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(15965); script_version("1.35"); script_cvs_date("Date: 2018/11/15 20:50:29"); script_cve_id("CVE-2004-0899", "CVE-2004-0900"); script_bugtraq_id(11919, 11920); script_xref(name:"MSFT", value:"MS04-042"); script_xref(name:"MSKB", value:"885249"); script_name(english:"MS04-042: Windows NT Multiple DHCP Vulnerabilities (885249)"); script_summary(english:"Checks version of Dhcpssvc.dll"); script_set_attribute(attribute:"synopsis", value: "Arbitrary code can be executed on the remote host via the DHCP service."); script_set_attribute(attribute:"description", value: "The remote host has the Windows DHCP server installed. There is a flaw in the remote version of this server that could allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges."); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2004/ms04-042"); script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows NT."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/12/14"); script_set_attribute(attribute:"patch_publication_date", value:"2004/12/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/12/14"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); script_family(english:"Windows : Microsoft Bulletins"); script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, 'Host/patch_management_checks'); exit(0); } include("audit.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_hotfixes.inc"); include("smb_func.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); bulletin = 'MS04-042'; kb = '885249'; kbs = make_list(kb); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE); get_kb_item_or_exit("SMB/Registry/Enumerated"); get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1); if (hotfix_check_sp_range(nt:'6') <= 0) audit(AUDIT_OS_SP_NOT_VULN); if (hotfix_check_nt_server() <= 0) exit(0, "The Windows host is not an NT Server."); if (hotfix_check_dhcpserver_installed() <= 0) audit(AUDIT_NOT_INST, "The DHCP Server service"); rootfile = hotfix_get_systemroot(); if (!rootfile) exit(1, "Failed to get the system root."); share = hotfix_path2share(path:rootfile); if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share); if (hotfix_is_vulnerable(os:"4.0", file:"Dhcpssvc.dll", version:"4.0.1381.7304", dir:"\system32", bulletin:bulletin, kb:kb)) { set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE); hotfix_security_hole(); hotfix_check_fversion_end(); exit(0); } else { hotfix_check_fversion_end(); audit(AUDIT_HOST_NOT, 'affected'); }
NASL family Windows NASL id SMB_KB885249.NASL description The remote host has the Windows DHCP server installed. There is a flaw in the remote version of this server that may allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 20368 published 2006-01-03 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20368 title MS04-042: Windows NT Multiple DHCP Vulnerabilities (885249) (uncredentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(20368); script_version("1.24"); script_cvs_date("Date: 2018/11/15 20:50:28"); script_cve_id("CVE-2004-0899", "CVE-2004-0900"); script_bugtraq_id(11919, 11920); script_xref(name:"MSFT", value:"MS04-042"); script_xref(name:"MSKB", value:"885249"); script_name(english:"MS04-042: Windows NT Multiple DHCP Vulnerabilities (885249) (uncredentialed check)"); script_summary(english:"Checks if MS04-042 is installed"); script_set_attribute(attribute:"synopsis", value:"Arbitrary code can be executed on the remote host through the DHCP service."); script_set_attribute(attribute:"description", value: "The remote host has the Windows DHCP server installed. There is a flaw in the remote version of this server that may allow an attacker to execute arbitrary code on the remote host with SYSTEM privileges." ); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2004/ms04-042"); script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows NT."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/12/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/01/03"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); script_family(english:"Windows"); script_dependencies("dcetest.nasl", "smb_nativelanman.nasl"); script_require_keys("Host/OS/smb", "Services/DCE/6bffd098-a112-3610-9833-46c3f874532d"); exit(0); } # include ('smb_func.inc'); os = get_kb_item ("Host/OS/smb") ; if ( !os || "Windows 4.0" >!< os ) exit(0); # DHCPSERVER Service port = get_kb_item ("Services/DCE/6bffd098-a112-3610-9833-46c3f874532d"); if (!port) exit (0); if (!get_port_state (port)) exit (0); soc = open_sock_tcp (port); if (!soc) exit (0); ret = dce_rpc_bind(cid:session_get_cid(), uuid:"6bffd098-a112-3610-9833-46c3f874532d", vers:1); send (socket:soc, data:ret); resp = recv (socket:soc, length:4096); if (!resp) { close (soc); exit (0); } ret = dce_rpc_parse_bind_ack (data:resp); if (isnull (ret) || (ret != 0)) { close (soc); exit (0); } # DhcpGetVersion - opcode : 0x1C # # long DhcpGetVersion ( # [in][unique][string] wchar_t * arg_1, # [in] long arg_2, # [in, out] long * arg_3, # [in] long arg_4, # [out] struct_1 ** arg_5, # [out] long * arg_6, # [out] long * arg_7 # ); data = class_parameter (ref_id:0x20000, name:get_host_ip()) + raw_dword (d:0) + raw_dword (d:0) + raw_dword (d:0) ; ret = dce_rpc_request (code:0x1C, data:data); send (socket:soc, data:ret); resp = recv (socket:soc, length:4096); close (soc); resp = dce_rpc_parse_response (data:resp); if (strlen(resp) != 12) exit (0); val = get_dword (blob:resp, pos:strlen(resp)-4); if (val != 0) exit (0); major = get_dword (blob:resp, pos:0); minor = get_dword (blob:resp, pos:4); # patched version 4.1 # vulnerable 1.1 if (major < 4) security_hole(port);
Oval
accepted 2008-03-24T04:00:24.710-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name John Hoyland organization Centennial Software name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability." family windows id oval:org.mitre.oval:def:2280 status accepted submitted 2004-12-16T12:00:00.000-04:00 title DHCP Server Logging Vulnerability (NT 4.0) version 72 accepted 2008-03-24T04:00:33.875-04:00 class vulnerability contributors name Ingrid Skoog organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability." family windows id oval:org.mitre.oval:def:4282 status accepted submitted 2005-01-27T12:00:00.000-04:00 title DHCP Server Logging Vulnerability (Terminal Server) version 71
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18341
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4282
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2280
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042