Forum |  HardWare.fr | News | Articles | PC | S'identifier | S'inscrire | Shop Recherche
1540 connectés 

  FORUM HardWare.fr
  Windows & Software

  Belle ! (hole inside + 2k)

 


 Mot :   Pseudo :  
 
Bas de page
Auteur Sujet :

Belle ! (hole inside + 2k)

n°620543
B-52
Contrario Contrariis Curantur
Posté le 27-03-2002 à 10:52:44  profilanswer
 

Je viens de recevoir cettealerte, je trouves ça pas mal comme trou:
 
 March 27, 2002--In this issue:
 
 
 
1. SECURITY RISKS
 
     - Local Security Vulnerability in Windows NT and Windows 2000
 
 
 
*******************************************************************
 
 
 
1. ***** SECURITY RISKS *****
 
 
 
* LOCAL SECURITY VULNERABILITY IN WINDOWS NT AND WINDOWS 2000
 
 
 
Radim "EliCZ" Picha (Bugs@EliCZ.cjb.net) discovered a vulnerability in Windows NT 4.0 and Windows 2000. He has written an exploit called DebPloit that shows  the weakness of a local Windows NT/2000 security and totally compromises entire security subsystem.
 
 
 
DebPloit uses a hole in the NT/2000 debugging subsystem and allows ANY user with ANY privileges (even Guest and Restricted user) to execute processes in the  security context of an administrator or a local system (SYSTEM) account. In other words, any person who have an access to the local computer can became an  administrator and do everything he/she wants.
 
 
 
 
 
 
 
Principle: Ask the debugging subsystem (smss.exe) to duplicate a handle to Target (any process running on the local computer):
 
 
 
1. Become dbgss client (DbgUiConnectToDbg).
 
 
 
2. Connect to the DbgSsApiPort Local Procedure Call (LPC) port (ZwConnectPort). Everyone can access this port.
 
 
 
3. Ask dbgss to handle CreateProcess SsApi with Target's client id (ZwRequestPort).
 
 
 
4. Wait for dbgss to reply with CREATE_PROCESS_DEBUG_EVENT (WaitForDebugEvent). Message contains a duplicated handle.
 
 
 
5. Impersonate your security context using a duplicated handle.
 
 
 
6. Execute any code (e.g. run an external program) in the security context of Target.
 
 
 
Download DebPloit with a source code from http://www.anticracking.sk/EliCZ/bugs/DebPloit.zip
 
 
 
 
 
 
 
To test your system for this vulnerability:
 
 
 
1. Download DebPloit.zip and unzip it to the directory on your hard drive.
 
 
 
2. Logoff and login again using Guest (or any other non-administrative account) account.
 
 
 
3. Run ERunAsX.exe from the command line and specify a program you wish to execute under the SYSTEM account (e.g. "ERunAsX.exe cmd" ).
 
 
 
4. Your program now runs under the SYSTEM account and you can do everything (e.g. create new user with an administrative privileges) on the local computer.
 
 
 
 
 
 
 
* HOTFIX
 
 
 
To close this hole and protect your computers and network against attacks from the inside, you can use an unofficial hotfix released by SmartLine, Inc.
 
 
 
DebPloitFix is a hotfix that closes the security hole using by the DebPloit exploit. DebPloitFix is implemented as a kernel mode driver that can be run  dinamically (no need to restart your system). DebPloitFix assigns the new security descriptor to the DbgSsApiPort LPC port so only the local system (SYSTEM  user) will be able to access this port.

mood
Publicité
Posté le 27-03-2002 à 10:52:44  profilanswer
 


Aller à :
Ajouter une réponse
  FORUM HardWare.fr
  Windows & Software

  Belle ! (hole inside + 2k)

 

Sujets relatifs
problème pour effacer 1 fichier--->galere inside![3d inside] Fonctionnement des réseaux et d'internet
[plus que newbie inside] créer un exe à partir d'un raccourci et autrCryptage 128 bit ou 4096 bit en France ? [legalité inside]
Reseau Local HS .. 'comprends pas ... :-( [Wi-Fi + XP inside]ftp fantome [paranomal inside]
Bordel dans mes icones sous XP [Capture inside]Je pige pas là... [ADSL Problem inside]
Oups, j'aurais peut être pas dû...(need help inside) 
Plus de sujets relatifs à : Belle ! (hole inside + 2k)


Copyright © 1997-2022 Hardware.fr SARL (Signaler un contenu illicite / Données personnelles) / Groupe LDLC / Shop HFR