Article ID: 230677 - View products that this article applies to.
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft Remote Access Service (RAS) client software may allow a user with the proper permissions to mount a denial-of-service attack or elevate his or her privileges on a RAS client computer.
This behavior occurs because the RAS client component that processes phonebook entries has an unchecked buffer. As a result, a specially malformed RAS phonebook entry can cause the RAS client to crash.
In very specific conditions, it can cause arbitrary code to run on the client computer. Because the RAS client operates in the security context of the local computer, the arbitrary code also runs in this context. This cannot occur accidentally.
Windows NT Server or Workstation 4.0To resolve this problem, obtain the latest service pack for Windows NT 4.0 or the individual software update. For information on obtaining the latest service pack, please go to:
Windows NT Server 4.0, Terminal Server EditionTo resolve this problem, obtain the latest service pack for Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/152734/EN-US/ )How to Obtain the Latest Windows NT 4.0 Service Pack
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows NT Server version 4.0, Terminal Server Edition Service Pack 6.
This vulnerability affects only computers running the RAS client software; it does not affect RAS servers. A user must have permission to add or modify phonebook entries to initiate an attack. Permissions can be set using the phonebook's access control list (ACL).
Computers at risk because of this vulnerability are workstations that are configured to dial other computers as servers, including Microsoft Windows NT 4.0, Terminal Server Edition, but are not typically configured to act as RAS clients. This vulnerability affects only local computers; a user cannot directly attack remote computers.
For additional security-related information about Microsoft products, please visit the following Microsoft Web site:
Article ID: 230677 - Last Review: December 29, 2014 - Revision: 5.0