MS01-007: Patch Available for Network DDE Agent Request Vulnerability

Article translations Article translations
Article ID: 285851 - View products that this article applies to.
This article was previously published under Q285851
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

SYMPTOMS

Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows 2000. The vulnerability could allow a malicious user to gain complete control over an affected computer.

Network Dynamic Data Exchange (DDE) is a technology that enables programs on different Windows-based computers to share data. This data sharing is accomplished by using communications channels that are called trusted shares, and trusted shares are managed by a service that is called the Network DDE Agent. By design, processes on the local computer can levy requests upon the Network DDE Agent, including ones that indicate what program should be run in conjunction with a particular trusted share. However, a vulnerability exists in Windows 2000 because the Network DDE Agent runs by using the Local System security context and processes all requests by using this context, rather than that of the user. This would give a malicious user an opportunity to cause the Network DDE Agent to run code in the Local System context. By doing so, a malicious user could gain complete control over the local computer.

To exploit this vulnerability, the malicious user would need the ability to run code on an affected computer. However, best practices strongly recommend against ever allowing unprivileged users to run code on security-critical computers such as domain controllers and other servers. If these recommendations have been followed, such computers would not be at risk. In addition, computers that are running Terminal Services are not affected by this vulnerability (except in the case where unprivileged users are allowed to log on at the console, which is never recommended). As a result of these limitations, workstations are most likely to be the computers that are affected by the vulnerability. Damage done by this vulnerability should be limited because, in most cases, even gaining complete control of a workstation would not convey any addition privileges on the domain.

Microsoft recommends that customers that are using Windows 2000-based workstations or who allow unprivileged users to run code on Windows 2000-based servers apply this patch immediately. As an additional precautionary measure, customers that are operating Windows 2000-based Web servers should consider applying the patch to those computers. If a malicious user were able to gain the ability to run code in a restricted context on a Web server by using another vulnerability, this vulnerability would provide a way to immediately elevate the malicious user's privileges and cause broader damage.

RESOLUTION

To resolve this problem, either obtain the hotfix referenced in this section or Windows 2000 Security Rollup Package 1 (SRP1). For additional information about SRP1, click the article number below to view the article in the Microsoft Knowledge Base:
311401 Windows 2000 Security Rollup Package 1 (SRP1), January 2002
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The following files are available for download from the Microsoft Download Center:
Collapse this imageExpand this image
Download
English Language Version

Collapse this imageExpand this image
Download
Arabic Language Version

Collapse this imageExpand this image
Download
Chinese (Simplified) Language Version

Collapse this imageExpand this image
Download
Chinese (Traditional) Language Version

Collapse this imageExpand this image
Download
Czech Language Version

Collapse this imageExpand this image
Download
Danish Language Version

Collapse this imageExpand this image
Download
Dutch Language Version

Collapse this imageExpand this image
Download
Finnish Language Version

Collapse this imageExpand this image
Download
French Language Version

Collapse this imageExpand this image
Download
German Language Version

Collapse this imageExpand this image
Download
Greek Language Version

Collapse this imageExpand this image
Download
Hebrew Language Version

Collapse this imageExpand this image
Download
Hungarian Language Version

Collapse this imageExpand this image
Download
Italian Language Version

Collapse this imageExpand this image
Download
Japanese Language Version

Collapse this imageExpand this image
Download
Japanese NEC Language Version

Collapse this imageExpand this image
Download
Korean Language Version

Collapse this imageExpand this image
Download
Norwegian Language Version

Collapse this imageExpand this image
Download
Polish Language Version

Collapse this imageExpand this image
Download
Portuguese (Brazilian) Language Version

Collapse this imageExpand this image
Download
Portuguese Language Version

Collapse this imageExpand this image
Download
Russian Language Version

Collapse this imageExpand this image
Download
Spanish Language Version

Collapse this imageExpand this image
Download
Swedish Language Version

Collapse this imageExpand this image
Download
Turkish Language Version

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file. The English version of this fix should have the following file attributes or later:
   Date        Time     Version        Size     File name
   --------------------------------------------------------
   5/29/2001   09:41a   5.0.2195.3649  178,960   Winlogon.exe 

STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows 2000. This problem was first corrected in Windows 2000 Service Pack 3.

MORE INFORMATION

For additional information about how to obtain a hotfix for Windows 2000 Datacenter Server, click the article number below to view the article in the Microsoft Knowledge Base:
265173 The Datacenter Program and Windows 2000 Datacenter Server Product
For additional information about how to install multiple hotfixes with only one reboot, click the article number below to view the article in the Microsoft Knowledge Base:
296861 Use QChain.exe to Install Multiple Hotfixes with One Reboot
For more information on this vulnerability, please see the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/ms01-007.mspx

Properties

Article ID: 285851 - Last Review: February 28, 2014 - Revision: 5.3
APPLIES TO
  • Microsoft Windows 2000 Server SP1
  • Microsoft Windows 2000 Server SP2
  • Microsoft Windows 2000 Advanced Server SP1
  • Microsoft Windows 2000 Advanced Server SP2
  • Microsoft Windows 2000 Professional SP1
  • Microsoft Windows 2000 Professional SP2
Keywords: 
kbnosurvey kbarchive kbhotfixserver kbqfe kbbug kbfix kbgraphxlinkcritical kbnetwork kbsecbulletin kbsecurity kbsecvulnerability kbwin2000presp3fix kbwin2000sp3fix KB285851

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com