Tuesday, February 07, 2006

Possible Vulnerability in Microsoft Windows Service ACL

Microsoft Security Advisory (914457) Possible Vulnerability in Windows Service ACLs. (Access List)

UPnP NetBT SCardSvr SSDP

Microsoft has investigated the PoC (prof of concept) and summarizes.

Users who run Windows XP Service Pack 1 and Windows Server 2003 Gold may be at risk, but the risk to Windows Server 2003 users is reduced.
Recommendation: Review the suggested actions and configure services ACLs as appropriate. Install Windows XP Service Pack 2, Windows Server 2003 Service Pack 1 to help protect against this vulnerability.

Access rights of concern.

The FILE_ALL_ACCESS privilege allows a user to completely control a file, including read, write and execute privileges.

The FILE_APPEND_DATA privilege allows a user to add data to a file.

The FILE_WRITE_DATA privilege allows a user to write and rewrite data to a file.

Registry key permissions of concern.

Registry Keys

Users with WRITE_DAC or KEY_SET_VALUE permissions can modify registry keys that specify executables, DLLs, and/or Globally Unique Identifiers (GUIDs).

The WRITE_DAC privilege allows a user to change permissions on an object, potentially granting themselves further permissions.

Microsoft Security Advisory

Stick around, this could get interesting.

No comments: