[4895] in bugtraq

home help back first fref pref prev next nref lref last post

GETADMIN 2 - THE SEQUEL

daemon@ATHENA.MIT.EDU (Mark Joseph Edwards)
Fri Jul 11 05:11:35 1997

Date: 	Thu, 10 Jul 1997 15:44:50 -0500
Reply-To: MJE <mark@ntshop.net>
From: Mark Joseph Edwards <mark@NTSHOP.NET>
X-To:         Undisclosed.Recipients@netspace.org
To: BUGTRAQ@NETSPACE.ORG

The hotfix released by MS for getadmin.exe DOES NOT WORK completely. Using
a slightly different tactic, the exploit can still be made to work in most
conditions (e.g. a not-too-heavily-loaded-down NT server).


By running a program that performs some slight manipulation <before>
running getadmin.exe, the exploit can still be run successfully. This was
tested on NT 4.0 w/SP3 and all current hotixes loaded as of July 10, 1997,
and found to work as stated.

This condition was reported to NTSecurity.NET by Constin Raiu, who
requested that we post this message to the relavant lists.

For sample code and sample .exe to test with, go to http://www.ntsecurity.ne
t and look at the GetAdmin page.

mje.

home help back first fref pref prev next nref lref last post