[9666] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Inherent weaknesses in NT system policies

daemon@ATHENA.MIT.EDU (Kurt Seifried)
Fri Feb 19 16:53:37 1999

Date: 	Fri, 19 Feb 1999 11:25:14 -0700
Reply-To: Kurt Seifried <listuser@SEIFRIED.ORG>
From: Kurt Seifried <listuser@SEIFRIED.ORG>
X-To:         mnemonix <mnemonix@GLOBALNET.CO.UK>
To: BUGTRAQ@NETSPACE.ORG

>There are certain key vulnerabilities in NT's System Policies that allow
>most restrictions to be by-passed. For instance, although Registry Editing
>tools can be disabled this restriction can be avoided with ease, but more
on
>that later.
>
>Consider a restrictive user System Policy where the user's shell is
>Explorer.exe and it only allows the Microsoft Word application
(winword.exe)
>to be run. It is launched from an icon on the desktop. This is the only
icon
>present. So the user can perform their work, write documents and save them,
>they are give write NTFS permissions only to their profile directory. The
>Registry editing tools have been disabled.
>
>This policy can be broken in a matter of minutes:

As any good little MCSE learns:

Give the full pathname to the programs you want to allow them to run. This
makes it a lot safer. There are ways around even this of course. NT is not
secure against a determined user, just boot from a floppy and replace the
registry if you really want to. I haven't looked in depth yet but MSIE 5.0
comes with it's own policy restrictions/etc (quite a few actually), I'm not
100% sure how they interact with NT's user policies/etc, but once I get a
chance to play with it some more I'll post that up.

-seifried, MCSE
https://www.seifried.org/

home help back first fref pref prev next nref lref last post