what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms00-004

ms00-004
Posted Feb 4, 2000

Microsoft has released a patch for a security vulnerability in an administrative utility that ships with Microsoft Windows NT 4.0, Terminal Server Edition. The utility creates a temporary file during execution that can contain security-sensitive information, but does not appropriately restrict access to it. As a result, a malicious user on the terminal server could read the file as it was being created. Microsoft FAQ on this issue is available here.

systems | windows
SHA-256 | fa5b52b98e64074061511032b60cf140f292f9015c3bbd36a249521d7140d5c1

ms00-004

Change Mirror Download
Microsoft Security Bulletin (MS00-004)
--------------------------------------

Patch Available for "RDISK Registry Enumeration File" Vulnerability

Originally Posted: January 21, 2000
Revised: February 3, 2000

Summary
=======

On January 21, 2000, Microsoft released the original version of this
bulletin, discussing a security vulnerability in a Microsoft(r) Windows
NT(r) 4.0 administrative utility. The original version of the bulletin
discussed the vulnerability within the context of Windows NT 4.0 Server,
Terminal Server Edition. However, we have since learned of scenarios under
which the vulnerability could also affect Windows NT 4.0 servers and
workstations, and have revised the bulletin accordingly.

The utility creates a temporary file during execution that can contain
security-sensitive information, but does not appropriately restrict access
to it. Under certain conditions, it could be possible for a malicious user
to read the file as it was being created

Frequently asked questions regarding this vulnerability can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-004.asp.

Issue
=====
The RDISK utility is used to create an Emergency Repair Disk (ERD) in order
to record machine state information as a contingency against system
failure. During execution, RDISK creates a temporary file containing an
enumeration of the registry. The ACLs on the file allow global read
permission, and as a result, a malicious user who knew that the
administrator was running RDISK could open the file and read the registry
enumeration information as it was being created. RDISK erases the file upon
successful completion, so under normal conditions there would be no lasting
vulnerability.

By default, the file is not shared and therefore could not be read by other
network users.

Affected Software Versions
==========================
- Microsoft Windows NT 4.0 Workstation
- Microsoft Windows NT 4.0 Server
- Microsoft Windows NT 4.0, Enterprise Edition
- Microsoft Windows NT 4.0, Terminal Server Edition

Patch Availability
==================
Windows NT 4.0 Workstation; Windows NT 4.0 Server; Windows NT 4.0 Server,
Enterprise Edition:
- Intel: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17745
- Alpha: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17747

Windows NT 4.0 Server, Terminal Server Edition:
- http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17384

NOTE: Additional security patches are available at the Microsoft Download
Center

More Information
================
Please see the following references for more information related to this
issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-004,
http://www.microsoft.com/technet/security/bulletin/fq00-004.asp.
- Microsoft Knowledge Base (KB) article Q249108,
Registry Data Is Viewable By All Users After Rdisk Repair Update,
http://www.microsoft.com/technet/support/kb.asp?ID=249108.
- Microsoft Knowledge Base (KB) article Q156328,
Description of Windows NT Emergency Repair Disk,
http://www.microsoft.com/technet/support/kb.asp?ID=156328
- Microsoft Security web site,
http://www.microsoft.com/technet/security/default.asp.

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments
===============
Microsoft thanks Arne Vidstrom (http://ntsecurity.nu) for reporting this
issue to us and working with us to protect customers.

Revisions
=========
- January 21, 2000: Bulletin Created.
- February 3, 2000: Bulletin revised to address other affected versions

----------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.


Last updated Thursday, February 3, 2000

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close