[17326] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Registry Permissions reminder - local privilege escalation on

daemon@ATHENA.MIT.EDU (Darren Reed)
Tue Oct 24 13:03:24 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200010240544.QAA00467@cairo.anu.edu.au>
Date:         Tue, 24 Oct 2000 16:44:29 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         mnemonix@GLOBALNET.CO.UK
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <000901c03d59$53991960$e7e593c3@david> from "David Litchfield" at
              Oct 23, 2000 09:25:41 PM

David,
      Thanks for the "heads up", but aside from manually checking this
single registry entry, is there any way people can be sure that the
permissions (from a larger view) are safely setup ?  For example, have
you reviewed the system's registry after using the SCM and applying the
"High security" policy ?  In comparing what it sets with documents on
the web, there was at least one registry entry that warranted editting.
Is this yet another or no ?  Maybe you should have mentioned that the
SCM should be used as a starting point for securing NT4.0 in your email?

Cheers,
Darren

home help back first fref pref prev next nref lref last post