[55] in Security FYI

home help back first fref pref prev next nref lref last post

Windows NT vulnerabilities with blank passwords and file sharing

daemon@ATHENA.MIT.EDU (mhpower@MIT.EDU)
Mon Jun 12 15:21:41 2000

From: mhpower@MIT.EDU
Message-ID: <20000612192138.7931.qmail@customer-care.infrastructure.org>
Date: Mon, 12 Jun 2000 15:21:38 -0400
To: security-fyi@mit.edu
Reply-To: net-security@MIT.EDU

-----BEGIN PGP SIGNED MESSAGE-----

As many of you noticed earlier this month, the SANS Institute
published a "List of The Top Ten Internet Security Threats", e.g., see

  http://www.sans.org/topten.htm
  http://news.cnet.com/news/0-1003-200-2000069.html

On this list, entry 7 is "Global file sharing and inappropriate
information sharing via NetBIOS". The IS Network Security team has
determined that this issue is currently of great relevance at MIT,
with some critical MIT resources at risk of immediate compromise.
There are also MIT computers known to be compromised through this
vulnerability within the past few weeks, and it's expected that
intruders can identify additional vulnerable computers via rapid
automated methods. The important MIT systems that we've already found
to be affected by this problem are all Windows NT machines, but the
problem can affect Unix (if Samba is installed) and Windows 9x.

Here are some of the specific items to check for on each Windows NT
machine in your area:

  -- the machine needs to have a well-chosen Administrator password.
     Many Windows NT machines at MIT have no Administrator password
     set, and have the default administrative shares. Typically, this
     means that anyone on the Internet can read and alter everything
     stored on the machine's disks, by way of a NetBIOS session with
     the login name Administrator and a blank password.

  -- names associated with your users and work projects should not be
     used as passwords, and should not be the login names of accounts
     that have a blank password. These names can often be found via
     remote anonymous NetBIOS queries. There are programs used by
     intruders that will automatically try all of these as login names
     and passwords, and currently this will result in successful
     access to many MIT machines.

  -- when setting up file sharing, be sure that all public read access
     is consistent with MIT's "Policy on the Use of Information
     Technology" (http://web.mit.edu/policies/13.2.html). Currently,
     some MIT machines have personal information about students and
     employees accessible via Windows file sharing. Also, some MIT
     machines have sharing set up to allow public write access to
     important data, allowing deletion or alteration by intruders.

General guidelines (not NT-specific) for choosing passwords can be
found at http://web.mit.edu/net-security/www/pw.html -- also, for NT,
http://support.microsoft.com/support/kb/articles/Q161/9/90.ASP
indicates how to require use of strong passwords. Blank passwords
should not be used for accounts that can obtain any type of remote
access to machines or their shared filesystems.

Since this message will not reach all relevant persons at MIT, the
Network Security team will be running vulnerability checks on all
mit.edu hosts to try to locate the ones that still have these NetBIOS
security problems (some of these checks have been done already as part
of assessing the scope of the problem). The web page
http://web.mit.edu/net-security/www/faq.html#legitimate-probes has a
few additional details about this type of vulnerability scanning.

Matt Power
Network Security team, MIT Information Systems

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBOUU2jqXcG113/1BtAQHlWwP+K++yewH+poYNWXZbuqMGOkuzgUe9Rs5R
JwDnt/tL3tv1gz31erLd1Pd+QjakC41oYY9sUc+j1v/FUxcSwTHl5aFCTKNwRoZ/
vOTIOc+AIqShLxoF6wJqI0PME3guJAr3rW5TBrPVInLDcOAdkjoksIm4faijHUK5
zBlT32RgQPE=
=tNKd
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post