what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-008

ms01-008
Posted Feb 12, 2001

Microsoft Security Advisory MS01-008 - A flaw in the NTLM Security Support Provider (NTLMSSP) service allows a non-administrative user to gain administrative control over the system. In order to perform this attack the user would need a valid login account and the ability to execute arbitrary code on the system. Microsoft FAQ on this issue available here.

tags | arbitrary
SHA-256 | fd372dce83d40400b88e4302defae7822e466e7f14d6a75ba1e1441d17864a81

ms01-008

Change Mirror Download
The following is a Security  Bulletin from the Microsoft Product Security
Notification Service.

Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************

-----BEGIN PGP SIGNED MESSAGE-----

- ---------------------------------------------------------------------
Title: NTLMSSP Privilege Elevation Vulnerability
Date: 07 February 2001
Software: Windows NT 4.0
Impact: Privilege Elevation
Bulletin: MS01-008

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/ms01-008.asp
- ---------------------------------------------------------------------

Issue:
======
A flaw in the NTLM Security Support Provider (NTLMSSP) service could
potentially allow a non-administrative user to gain administrative
control over the system. In order to perform this attack the user
would need a valid login account and the ability to execute arbitrary
code on the system.

Mitigating Controls:
====================
- This vulnerability could only be exploited by an attacker
who could log onto the affected machine interactively.

- Servers could only be affected if the attacker were given the
ability to load a program of her choice onto the machine and
execute it locally. Best practices recommend against this.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-008.asp
for information on obtaining this patch.

Acknowledgment:
===============
- Todd Sabin of BindView (http://razor.bindview.com)

- ----------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.


-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOoHQDI0ZSRQxA/UrAQEYsAf+P433UquQRAqZRjPNGISjtT6NfI9ahVqp
7BYcOpkzNca2xox4e4My1ErNLJQvMjW9qWR/S6vuwW3qx7UymFDh2wReRujxNZWj
2B32SrWQTAwSZCvJZXWwVAQ0/Ad6YsZtSG0SmAnLJbXiWLhPmDpU1ewuvricHFoU
YixcN5wuAStMQc1ieK0jkI4UJRXXEzqxvWIgtC1TbC6m5MGYR/jXGONBQIsK66a9
gEbElK8oBIlX5nwBZR7K+5nHZrAmSy/pewSJLdUC2H68eKd/mPurMZtW7LpLRMuQ
QoZBtJrUzhf8xGYdyis5p1P5WL/LalE9xqQ/R6NfHjFQ92fxQlEKhw==
=BjqE
-----END PGP SIGNATURE-----

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close