=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN620
_____________________________________________________________________

DATE                      : 12/10/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Windows 2000, Windows XP, Windows Server 2003.

======================================================================

MS05-051 - Vulnerabilities in MSDTC and COM+ Could Allow Remote
            Code Execution (902400)

   - Affected Software:
     - Windows 2000 Service Pack 4
     - Windows XP Service Pack 1
     - Windows XP Service Pack 2
     - Windows XP Professional x64 Edition
     - Windows Server 2003
     - Windows Server 2003 Service Pack 1
     - Windows Server 2003 for Itanium-based Systems
     - Windows Server 2003 with SP1 for Itanium-based Systems
     - Windows Server 2003 x64 Edition

     - Impact: Remote Code Execution
     - Version Number: 1.0


Full MS05-051 advisory:
http://www.microsoft.com/technet/security/bulletin/MS05-051.mspx

Vulnerability Details:

	
MSDTC Vulnerability - CAN-2005-2119:

A remote code execution and local elevation of privilege vulnerability exists
in the Microsoft Distributed Transaction Coordinator that could allow an
attacker who successfully exploited this vulnerability to take complete
control of the affected system.

More details are provided in the following eEye advisory:
http://www.eeye.com/html/research/advisories/AD20051011b.html


COM+ Vulnerability - CAN-2005-1978:

A remote code execution and local elevation of privilege vulnerability exists
in COM+ that could allow an attacker who successfully exploited this
vulnerability to take complete control of the affected system.


TIP Vulnerability - CAN-2005-1979:

A denial of service vulnerability exists that could allow an attacker to
send a specially crafted network message to an affected system. An attacker
could cause the Distributed Transaction Coordinator to stop responding.

More details are provided in the following iDefense advisories:
http://www.idefense.com/application/poi/display?id=319&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=320&type=vulnerabilities

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================


