The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Vulnerability in Windows Vista Firewall Allows Information Disclosure (MS07-038)


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 11 Jul 2007 12:01:42 +0200
Subject: [NT] Vulnerability in Windows Vista Firewall Allows Information Disclosure (MS07-038)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070711093227.DDDF15933@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Vulnerability in Windows Vista Firewall Allows Information Disclosure 
(MS07-038)
------------------------------------------------------------------------


SUMMARY

This moderate security update resolves a privately reported vulnerability. 
This vulnerability could allow incoming unsolicited network traffic to 
access a network interface. An attacker could potentially gather 
information about the affected host.

DETAILS

Vulnerable Systems:
 *  
<http://www.microsoft.com/downloads/details.aspx?FamilyId=e9b64746-6afa-4a30-833d-e058e000c821>; Windows Vista
 *  
<http://www.microsoft.com/downloads/details.aspx?FamilyId=0df5d190-3ad7-42d5-8629-43c47ec450cb>; Windows Vista x64 Edition

Windows Vista Firewall Blocking Rule Information Disclosure Vulnerability 
- CVE-2007-3038
There is an information disclosure vulnerability in Windows Vista that 
could allow a remote anonymous attacker to send inbound network traffic to 
the affected system. It would be possible for the attacker to gain 
information about the system over the network.

Workarounds for Windows Vista Firewall Blocking Rule Information 
Disclosure Vulnerability - CVE-2007-3038
Workaround refers to a setting or configuration change that does not 
correct the underlying vulnerability but would help block known attack 
vectors before you apply the update. Microsoft has tested the following 
workarounds and states in the discussion whether a workaround reduces 
functionality:

 * Disable Teredo
You can help protect against this vulnerability by disabling the Teredo 
transport mechanisum. This prevents Teredo from being used as a transport 
or mechanism to traverse the NAT. To do this, follow these steps:


1. Right-click on the Runmenu item and choose Run as elevated.

2. In the Run box, type Netshintter set st disable

 * Disable Teredo by modifying the registry.
Teredo can also be disabled by modifying the Windows registry. Create the 
following registry value to disable Teredo as a transport mechanism.


Note Using Registry Editor incorrectly can cause serious problems that may 
require you to reinstall your operating system. Microsoft cannot guarantee 
that problems resulting from the incorrect use of Registry Editor can be 
solved. Use Registry Editor at your own risk. For information about how to 
edit the registry, view the "Changing Keys And Values" Help topic in 
Registry Editor (Regedit.exe) or view the "Add and Delete Information in 
the Registry" and "Edit Registry Data" Help topics in Regedt32.exe

1. Start, click Run, type regedit" (without the quotation marks), and then 
click OK.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcpip6\Parameters\

 * DisabledComponents.


 * 0x8 to disable Teredo.


Impact of Workaround: If you disable Teredo, depending on network 
configuration, applications that use the Teredo interface will not 
function or be accessible.

 * Block inbound and outbound Teredo UDP traffic using a Windows Vista 
Firewall setting.
A custom firewall rule can be created that blocks all Teredo related 
traffic from communicating with the affected system. To do this, follow 
these steps:


1. Click Control Panel, click Classic View.

2. Click Administrative Tools and then Double-click Windows Firewall with 
Advanced Security.

3. Select Inbound Rules.

4. Select CoreNetworking - Teredo (UDP-In).

5. Right click, select Properties.

6. Select Block the connections .

7. Select Outbound Rules.

8. Select Core Networking - Teredo (UDP-Out).

9. Right click, select Properties.

10. Select Block the connections .

Impact of Workaround: If you block Teredo network traffic using the custom 
Windows Firewall rule, applications that use the Teredo interface will not 
function properly or be accessible.

 * Block Teredo UDP outbound traffic on perimeter firewalls.
Blocking all outbound UDP traffic destined to port 3544 at the network 
perimeter will disallow affected Vista systems from communicating with 
external attempts to exploit the vulnerability.


Impact of Workaround: Depending on network configuration, applications 
that use the Teredo interface will not function or be accessible outside 
of the network perimeter.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3038>; 
CVE-2007-3038


ADDITIONAL INFORMATION

The information has been provided by Microsoft Product Security.
The original article can be found at:  
<http://www.microsoft.com/technet/security/Bulletin/ms07-038.mspx>; 
http://www.microsoft.com/technet/security/Bulletin/ms07-038.mspx




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру