Description
Active Directory in Windows 2000, when supporting Kerberos V authentication and GSSAPI, allows remote attackers to cause a denial of service (hang) via an LDAP client that sets the page length to zero during a large request.
Product(s):
- Microsoft Windows 2000
- Microsoft Windows 2000 Japanese Server Edition
- Microsoft Windows 2000 Advanced Server Edition
- Microsoft Windows 2000 Datacenter Server Edition
- Microsoft Windows 2000 Professional Edition
- Microsoft Windows 2000 Server Edition
- Microsoft Windows 2000 Beta 3
- Microsoft windows 2000_gold
- Microsoft Windows 2000 Addvanced Server (Initial Release)
- Microsoft Windows 2000 Datacenter Server (Initial Release)
- Microsoft Windows 2000 Professional (Initial release)
- Microsoft Windows 2000 Server (Inital release)
- Microsoft windows 2000_rc1
- Microsoft windows 2000_rc2
- Microsoft windows 2000_sp1
- Microsoft Windows 2000 Service Pack 1 Advanced Server Edition
- Microsoft Windows 2000 Service Pack 1 Datacenter Server Edition
- Microsoft Windows 2000 Service Pack 1 Professional Edition
- Microsoft Windows 2000 Service Pack 1 Server Edition
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Server SP1
- Microsoft windows 2000_sp2
- Microsoft Windows 2000 Service Pack 2 Advanced Server Edition
- Microsoft Windows 2000 Service Pack 2 Datacenter Server Edition
- Microsoft Windows 2000 Service Pack 2 Professional Edition
- Microsoft Windows 2000 Service Pack 2 Server Edition
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Server SP2
- Microsoft windows 2000_sp3
- Microsoft Windows 2000 Service Pack 3 Advanced Server Edition
- Microsoft Windows 2000 Service Pack 3 Datacenter Server Edition
- Microsoft Windows 2000 Service Pack 3 Professional Edition
- Microsoft Windows 2000 Service Pack 3 Server Edition
- Microsoft Windows 2000 Advanced Server SP3
- Microsoft Windows 2000 Datacenter Server SP3
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Server SP3
- Microsoft Windows 2000 Service Pack 4
- Microsoft Windows 2000 Service Pack 4 Advanced Server Edition
- Microsoft Windows 2000 Service Pack 4 Datacenter Server Edition
- Microsoft Windows 2000 Service Pack 4 Professional Edition
- Microsoft Windows 2000 Service Pack 4 Server Edition
- Microsoft Windows 2000 Service Pack 4 French
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows 2000 Server SP4
- Microsoft windows 2000_beta3
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2002-2328, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-2328 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Improper-Input-Handling
- https://capec.mitre.org/data/definitions/10.html
- https://capec.mitre.org/data/definitions/101.html
- https://capec.mitre.org/data/definitions/104.html
- https://capec.mitre.org/data/definitions/108.html
- https://capec.mitre.org/data/definitions/109.html
- https://capec.mitre.org/data/definitions/110.html
- https://capec.mitre.org/data/definitions/120.html
- https://capec.mitre.org/data/definitions/13.html
- https://capec.mitre.org/data/definitions/135.html
- https://capec.mitre.org/data/definitions/136.html
- https://capec.mitre.org/data/definitions/14.html
- https://capec.mitre.org/data/definitions/153.html
- https://capec.mitre.org/data/definitions/182.html
- https://capec.mitre.org/data/definitions/209.html
- https://capec.mitre.org/data/definitions/22.html
- https://capec.mitre.org/data/definitions/23.html
- https://capec.mitre.org/data/definitions/230.html
- https://capec.mitre.org/data/definitions/231.html
- https://capec.mitre.org/data/definitions/24.html
- https://capec.mitre.org/data/definitions/250.html
- https://capec.mitre.org/data/definitions/261.html
- https://capec.mitre.org/data/definitions/267.html
- https://capec.mitre.org/data/definitions/28.html
- https://capec.mitre.org/data/definitions/3.html
- https://capec.mitre.org/data/definitions/31.html
- https://capec.mitre.org/data/definitions/42.html
- https://capec.mitre.org/data/definitions/43.html
- https://capec.mitre.org/data/definitions/45.html
- https://capec.mitre.org/data/definitions/46.html
- https://capec.mitre.org/data/definitions/47.html
- https://capec.mitre.org/data/definitions/473.html
- https://capec.mitre.org/data/definitions/52.html
- https://capec.mitre.org/data/definitions/53.html
- https://capec.mitre.org/data/definitions/588.html
- https://capec.mitre.org/data/definitions/63.html
- https://capec.mitre.org/data/definitions/64.html
- https://capec.mitre.org/data/definitions/664.html
- https://capec.mitre.org/data/definitions/67.html
- https://capec.mitre.org/data/definitions/7.html
- https://capec.mitre.org/data/definitions/71.html
- https://capec.mitre.org/data/definitions/72.html
- https://capec.mitre.org/data/definitions/73.html
- https://capec.mitre.org/data/definitions/78.html
- https://capec.mitre.org/data/definitions/79.html
- https://capec.mitre.org/data/definitions/8.html
- https://capec.mitre.org/data/definitions/80.html
- https://capec.mitre.org/data/definitions/81.html
- https://capec.mitre.org/data/definitions/83.html
- https://capec.mitre.org/data/definitions/85.html
- https://capec.mitre.org/data/definitions/88.html
- https://capec.mitre.org/data/definitions/9.html
- https://nvd.nist.gov/vuln/detail/CVE-2002-2328