Public exploits available
On this page
A remote code execution vulnerability exists in the License Logging service.
An attacker who successfully exploited this vulnerability could take complete control of the affected system. The vulnerability, if exploited, could allow an attacker to cause the License Logging service on Windows Server 2003 to stop responding to all requests.
Technical details (analysis)
The License Logging service is a tool that was originally designed to help customers manage licenses for the Microsoft server products that are licensed in the Server Client Access License (CAL) model. License Logging service is one of the services used by Windows Small Business Server 2003 or earlier to manage CALs. A buffer overrun occurs in LLS service that can be exploited via \\pipe\llsrpc named pipe with a a crafted packet.
Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
Microsoft Windows 2000 Server Service Pack 3 and Microsoft Windows 2000 Server Service Pack 4
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows 2000 Professional Service Pack 3
Microsoft Windows 2000 Professional Service Pack 4
Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium)
Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)
Release Date: 2005-02-08T00:00:00
Known false positives
No known false positives at this time.
Disable the License Logging service.
Use the Group Policy settings to disable License Logging Service on all affected systems that do not require this feature.
On Windows NT Server 4.0 Service Pack 6a, Windows NT Server 4.0 Terminal Server Edition Service Pack 6, and Windows 2000 Server Service Pack 3 remove the License Logging service from the NullSessionPipes registry key.
Use a personal firewall, such as the Internet Connection Firewall, which is included with Windows Server 2003.
Block TCP ports 139 and 445 at the firewall.
Run the Configure E-mail and Internet Connection Wizard.
Enable advanced TCP/IP filtering on systems that support this feature.
Block the affected ports by using IPSec on the affected systems.