Patch available for invalid RDP data vulnerability

This article has been archived. It is offered "as is" and will no longer be updated.
Symptoms
Microsoft has released a patch that eliminates a security vulnerability on Windows 2000-based computers that are running Terminal Services. The vulnerability could allow a malicious user to cause an affected server to display an error message on a blue screen or stop responding (hang).

The implementation of the Remote Data Protocol (RDP) in Windows 2000 does not correctly handle a particular series of data packets. If such a series of packets are received by an affected server, the server may display an error message on a blue screen or hang. You can resolve the problem by rebooting the server, but any work in progress at the time of the attack is lost.

The malicious user does not need to start a session with an affected server to exploit this vulnerability; the malicious user needs only to send the correct series of packets to the RDP port on the server. The specific sequence of data packets involved in this vulnerability cannot be generated as part of a legitimate Terminal Services session.

Computers that are running Microsoft Windows NT Server 4.0, Terminal Services Edition are not affected by this vulnerability.
Resolution
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to obtain the latest Windows 2000 service pack
The following files are available for download from the MicrosoftDownload Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.The English-language version of this fix should have the following file attributes or later:
   Date        Time    Version        Size     File name     Encryption   -----------------------------------------------------------------------   01/25/2001  11:57a  5.0.2195.2847  106,256  Instrdp5.dll  not available   01/25/2001  11:57a  5.0.2195.2847   88,056  Rdpwd.sys     40-bit   01/25/2001  11:57a  5.0.2195.2847   88,024  Rdpwd.sys     56-bit				

Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section. This problem was first corrected in Windows 2000 Service Pack 2.
More information
For more information, view the following Microsoft Security Bulletin Web site:For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the following article number to view the article in the Microsoft Knowledge Base:
249149 Installing Microsoft Windows 2000 and Windows 2000 hotfixes
Properties

Article ID: 286132 - Last Review: 01/06/2015 06:10:14 - Revision: 6.0

  • kbnosurvey kbarchive kbbug kbenv kbfix kbgraphxlinkcritical kbwin2000presp2fix KB286132
Feedback