[17326] in bugtraq
Re: Registry Permissions reminder - local privilege escalation on
daemon@ATHENA.MIT.EDU (Darren Reed)
Tue Oct 24 13:03:24 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <200010240544.QAA00467@cairo.anu.edu.au>
Date: Tue, 24 Oct 2000 16:44:29 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To: mnemonix@GLOBALNET.CO.UK
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <000901c03d59$53991960$e7e593c3@david> from "David Litchfield" at
Oct 23, 2000 09:25:41 PM
David,
Thanks for the "heads up", but aside from manually checking this
single registry entry, is there any way people can be sure that the
permissions (from a larger view) are safely setup ? For example, have
you reviewed the system's registry after using the SCM and applying the
"High security" policy ? In comparing what it sets with documents on
the web, there was at least one registry entry that warranted editting.
Is this yet another or no ? Maybe you should have mentioned that the
SCM should be used as a starting point for securing NT4.0 in your email?
Cheers,
Darren