[24006] in bugtraq

home help back first fref pref prev next nref lref last post

RE: The "Lunch Break Hole"

daemon@ATHENA.MIT.EDU (David LeBlanc)
Mon Jan 28 14:34:00 2002

From: "David LeBlanc" <dleblanc@mindspring.com>
To: <bugtraq@securityfocus.com>
Date: Sun, 27 Jan 2002 00:55:32 -0800
Message-ID: <00fd01c1a710$61406510$0800a8c0@davenet.local>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In-Reply-To: <E16SdXT-0007Kq-00@mailgate.urz.tu-dresden.de>


> There are chances that someone already knows your password, 
> and that he 
> uses a security hole of Windows 2000 to log into your machine without 
> leaving any logon/logoff traces in the Security log!
[snip]
> Because the locking of the machine creates no Security event 
> by design, a 
> local attacker can use this hole to log onto a locked machine 
> and lock this 
> machine again (when he is done), without leaving logon/logoff 
> traces of his 
> successful break in in the Security log! 

This does not repro on my XP Pro system. When I lock and unlock the
system, it creates events in the security events IF I have logon
auditing enabled. I haven't had time to test against Windows 2000.

And, BTW, if someone already knows your password, this should be the
least of your worries.



home help back first fref pref prev next nref lref last post