[11980] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Update to ODBC/RDS vulnerabilities

daemon@ATHENA.MIT.EDU (rfp@WIRETRIP.NET)
Thu Sep 23 18:49:48 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.9909222034170.25636-100000@eight.wiretrip.net>
Date:         Wed, 22 Sep 1999 20:50:27 -0500
Reply-To: rfp@WIRETRIP.NET
From: rfp@WIRETRIP.NET
X-To:         David LeBlanc <dleblanc@microsoft.com>
To: BUGTRAQ@SECURITYFOCUS.COM

> You did your testing as an administrator on the machine.  Network

No, I specifically did *NOT* do this, to avoid the same goofs that the
guy who did the latest DCOM posts did.  Not that it was his fault; I
was just wary of where he went wrong, and tried to avoid that.

I specifically yanked one machine out of the domain and made it into
another workgroup instead.  I created a local account on that box of user
'rfp', no special rights (normal user).  I used this to query regedit
from.  I created the account from scratch to make sure it was clean.

On the servers, on one I added domain account rfp, normal user.  Different
password than the first so I know I would be prompted for login/password
when connecting.  On another server which was only in the workgroup, I
added a local user, same as above.  Normal user rights, no administrative
stuff.  Again, freshly created accounts to make sure nothing silly was
going on.

Then I queried from 'remote', non-associated box to these servers.  I
enter the login/password of rfp.  That's logging in as rfp on one box,
authenticating as rfp to the second, no administrative mojo to been seen.
I was able to view the registry, and change that key.  Total 'cross
mojonation'.

But I see your point on being limited by 'AllowedPaths'.  Has anyone else
been able to recreate this?  What you say makes sense, so I don't know why
it would work on mine.  My NT configurations are not custom nor fancy.

> It is also generally a good practice to place router filters in front of
> your internet-exposed web servers such that they cannot make outbound
> connections to places where they shouldn't.  People who took such
> precautions found that things such as the .htr overflow didn't work, and
> would prevent your UNC path variant from working.  Turning off the

Right.

> Server and Workstation services, as well as unbinding NetBIOS from the
> external interface would also prevent an attack involving an external
> UNC path from working.

I said it as an FYI of another approach to he exploit potential.  If your
box was locked down in the first place none of this would be an issue, no?
:)  After all, RDS stuff is slightly in the sample-scripts arena--everyone
should know better.

But they don't.

Cheers,
.r.f.p.

home help back first fref pref prev next nref lref last post