[10958] in bugtraq
NT Login Default Folder Vulnerability
daemon@ATHENA.MIT.EDU (Ben Greenbaum)
Tue Jul 6 18:53:45 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSF.4.10.9907061146370.59534-100000@www.securityfocus.com>
Date: Tue, 6 Jul 1999 11:56:55 -0700
Reply-To: Ben Greenbaum <beng@WWW.SECURITYFOCUS.COM>
From: Ben Greenbaum <beng@WWW.SECURITYFOCUS.COM>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
I just tested this on NT4 SP4 and this is real! Policies are, for the most
part, obsolete....
Compiled from postings to NTbugtraq June 28 - June 30 by Martin Wolf
<martinw@INFOSUPPORT.COM> and Michael Benadiba <michael@MBCCS.COM>.
When a user logs into an NT machine, there are a few processes that are
started automatically, including explorer.exe. These programs are normally
in %winroot% or %winroot%\system32. The problem is that NT will look for
these programs first in the user's home directory. If no user folder is
specified, it will look in the root of the system drive. Only if the
program it is looking for is not found in that location will it look in
the 'normal' location. This allows any user to rename any executable and
have it run at login, effectively bypassing many policy restrictions. The
list of currently known filenames that will work is: explorer.exe,
nddeagnt.exe, taskmgr.exe and userinit.exe .
To test this: Log in as a normal user. Copy command.com to your home
directory and rename it explorer.exe. Log out and log back in.
Ben Greenbaum
SecurityFocus
www.securityfocus.com