This article was previously published under Q299687
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has released a patch that eliminates a security vulnerability in a component that is a part of Windows 2000 Service Pack 2 (SP2). This vulnerability involves a Lightweight Directory Access Protocol (LDAP) function that is only available if the LDAP server has been configured to support secure LDAP over Secure Sockets Layer (SSL) sessions, and whose purpose is to allow users to change the data attributes of directory principals. By design, the function should check the authorizations of the user before completing the request. However, it contains an error that manifests itself only when the directory principal is a domain user and the data attribute is the domain password. When this is the case, the function fails to check the permissions of the requester, with the result that it could be possible for a user to change any other user's domain login password.
An attacker could change another user's password for either of two purposes. To cause a denial of service by preventing the other user from logging on, or to log into the user's account and gain any privileges the user had. Clearly, the most serious case would be one in which the attacker changed a domain administrator's password and logged into the administrator's account.
By design, the function affected can be called by any user who can connect to the LDAP server, including users who connect by using anonymous sessions. As a result, any user who could establish a connection with an affected server could exploit the vulnerability.
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The English version of this fix should have the following file attributes or later: