MS01-031: Predictable Named Pipes Could Enable Privilege Elevation with Telnet
This article was previously published under Q287912
This article has been archived. It is offered "as is" and will no longer be updated.
Two privilege-elevation vulnerabilities exist in the Windows 2000 Telnet service that could enable an attacker to gain full control over an affected server, and enable the attacker to take any action on the server.
When a new Telnet session is established, the service creates a named pipe and runs any code that is associated with the named pipe as part of the initialization process. However, the pipe's name is predictable, and if Telnet finds an existing pipe with that name, it uses the existing pipe. An attacker who had the ability to load and run code on the server could create the pipe and associate a program with it; the Telnet service would run the code in the Local System context when it established the next Telnet session.
- Because the attacker would need the ability to load and run code on the Telnet server, it is likely that these vulnerabilities could only be exploited by an attacker who had the ability to run code locally on the Telnet server.
- Administrative privileges are necessary to start the Telnet service, so the attacker could only exploit the vulnerability if Telnet were already started on the computer.
To resolve this problem, either obtain Windows 2000 Service Pack 3 or Windows 2000 Security Rollup Package 1 (SRP1). To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service PackFor additional information about SRP1, click the article number below to view the article in the Microsoft Knowledge Base:
311401 Windows 2000 Security Rollup Package 1 (SRP1), January 2002The following file is available for download from the Microsoft Download Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online ServicesMicrosoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.The English version of this fix should have the following file attributes or later:
Date Time Version Size File name ----------------------------------------------------- 05/24/2001 04:14p 5.0.33667.1 186,128 Tlntsvr.exe
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows 2000. This problem was first corrected in Windows 2000 Service Pack 3.
For additional information about how to obtain a hotfix for Windows 2000 Datacenter Server, click the article number below to view the article in the Microsoft Knowledge Base:
265173 The Datacenter Program and Windows 2000 Datacenter Server ProductFor additional information about how to install multiple hotfixes with only one reboot, click the article number below to view the article in the Microsoft Knowledge Base:
296861 Use QChain.exe to Install Multiple Hotfixes with One RebootFor additional information about what is fixed by this patch, click the article number below to view the article in the Microsoft Knowledge Base:
300855 Windows 2000 Telnet Security RollupFor more information about this vulnerability, see the following Microsoft Web site:
Article ID: 287912 - Last Review: 02/28/2014 04:25:24 - Revision: 5.3
Microsoft Windows 2000 Server SP1, Microsoft Windows 2000 Server SP2, Microsoft Windows 2000 Advanced Server SP1, Microsoft Windows 2000 Advanced Server SP2, Microsoft Windows 2000 Professional SP2, Microsoft Windows 2000 Professional SP1
- kbnosurvey kbarchive kbbug kbfix kbsechack kbsecurity kbsecvulnerability kbwin2000presp3fix kbwin2000sp3fix KB287912