Microsoft Windows NT "Registry Permissions" Vulnerability
Privacy and Legal Notice
CIAC INFORMATION BULLETIN
L-026: Microsoft Windows NT "Registry Permissions" Vulnerability
December 12, 2000 18:00 GMT
PROBLEM: Three registry keys: (1) SNMP Parameters, (2) RAS
Administration, and (3) MTS Package Administration have default
permissions that are inappropriately set.
PLATFORM: Microsoft Windows NT 4.0 Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Server, Enterprise Edition Microsoft
Windows NT 4.0 Server, Terminal Server Edition
DAMAGE: The default permissions could allow a malicious user to gain
additional privileges on an affected machine.
SOLUTION: Apply the patch indicated below.
VULNERABILITY The risk is medium. Allows elevated privileges, but must have
ASSESSMENT: prior access.
[****** Start of Microsoft Security Bulletin ******]
Microsoft Security Bulletin (MS00-095)
Tool Available for "Registry Permissions" Vulnerability
Originally posted: December 06, 2000
Summary
Microsoft has released a tool that corrects the permissions on several
registry values in Microsoft® Windows NT® 4.0. The default permissions
could allow a malicious user to gain additional privileges on an affected
machine.
Frequently asked questions regarding this vulnerability and the patch can
be found at http://www.microsoft.com/technet/security/bulletin/fq00-095.asp
Issue
Three registry keys have default permissions that are inappropriately
loose. The keys, and the risk they pose, are as follows:
The "SNMP Parameters" key,
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters,
provides the SNMP community name and SNMP management station
identifiers, if they exist. Reading this information would enable a
malicious user to pose as a bona fide SNMP manager for any community the
affected machine belonged to. (In actuality, though, the same
information could be obtained by monitoring network traffic). Changing
this information would enable her to create a community consisting
solely of her local machine, as a way of gaining management privileges
on it. SNMP is not installed on Windows NT 4.0 machines by default.
The "RAS Administration" key,
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RAS,
provides a way to install third-party RAS products that work with the
Windows NT native RAS service. By changing one of the values in this
key, it would be possible for a malicious user to specify code of her
choice as a third-party management tool. The code would then run in the
LocalSystem security context. Although it might be possible to make the
needed registry changes remotely, the malicious user’s code would need
to reside on the affected machine itself. RAS is not installed on
Windows NT 4.0 machines by default.
The "MTS Package Administration" key,
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Transaction Server\Packages,
includes information about which users are allowed to install and change
MTS packages. By adding herself as an MTS manager, a malicious user
could gain the ability to add, delete or change MTS packages. Although
it might be possible in some cases to make the needed registry changes
remotely, the malicious user would still need the ability to log onto
the affected machine interactively in order to exercise her new
privileges. MTS is not installed on Windows NT 4.0 machines by default.
In addition to correcting the permissions on these keys, the tool also
changes the permissions on several other keys that have previously been
discussed. Specifically, the tool makes all the changes discussed in
Microsoft Security Bulletins MS00-008 and MS00-024.
Affected Software Versions
Microsoft Windows NT 4.0
Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Server, Enterprise Edition
Microsoft Windows NT 4.0 Server, Terminal Server Edition
Patch Availability
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24501
Note: The version of the tool in this bulletin also includes all changes
discussed in Security Bulletins MS00-008 and MS00-024.
Note: This tool may be run on machines running Windows NT 4.0 Service
Packs 5 and 6a.
Note Additional security patches are available at the Microsoft Download
Center
More Information
Please see the following references for more information related to this
issue.
Frequently Asked Questions: Microsoft Security Bulletin MS00-095,
http://www.microsoft.com/technet/security/bulletin/fq00-095.asp
Microsoft Security Bulletin MS00-008,
http://www.microsoft.com/technet/security/bulletin/ms00-008.asp
Microsoft Security Bulletin MS00-024, http://www.microsoft.com/technet/security/bulletin/ms00-024
Microsoft Knowledge Base article Q265714 discusses the "SNMP Parameters"
vulnerability and will be available soon.
Microsoft Knowledge Base article Q267861 discusses the "RAS
Administration" vulnerability and will be available soon.
Microsoft Knowledge Base article Q267864 discusses the "MTS Package
Administration" vulnerability and will be available soon.
Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp
Acknowledgments
Microsoft thanks the following people for working with us to protect
customers:
Chris Anley of @stake for reporting the "SNMP Parameters" vulnerability.
Milan Dadok for reporting the "RAS Administration" vulnerability.
Glenn Larsson for reporting the "MTS Package Administrator"
vulnerability.
Revisions
December 06, 2000: Bulletin Created.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT,
INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
[****** End of Microsoft Security Bulletin ******]
CIAC wishes to acknowledge the contributions of Microsoft Corporation for the
information contained in this bulletin.
CIAC services are available to DOE, DOE Contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 925-422-8193 (7 x 24)
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@llnl.gov
World Wide Web: http://www.ciac.org/
http://ciac.llnl.gov
(same machine -- either one will work)
Anonymous FTP: ftp.ciac.org
ciac.llnl.gov
(same machine -- either one will work)
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
UCRL-MI-119788
[Privacy and Legal Notice]
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH