Lucene search

K

nt4.index.server.2.0.txt

🗓️ 17 Aug 1999 00:00:00Reported by MnemonixType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 27 Views

Index Server 2.0 opens Registry paths, granting read access to guest accounts, posing risks.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Date: Tue, 23 Mar 1999 23:40:55 -0000  
From: Mnemonix <[email protected]>  
To: [email protected]  
Subject: Index Server 2.0 and the Registry  
  
  
When Microsoft's Index Server 2.0 is installed on NT 4 with   
Internet Information Server 4 it opens a new "AllowedPath"   
into the Windows NT Registry.  
  
Administrators can control who can access the Windows NT   
Registry via the network by editing permissions on the   
Winreg key found under  
  
HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\Winreg  
  
By default, on NT Server 4, the permissions on this key are   
set to Administrators with Full Control. No-one else should   
have access (although it doesn't really work out like this in   
the end.) There are certain paths through the Registry that   
remote users, whether they are Administrators are not, may   
access. These are listed in the AllowedPaths subkey found   
under the Winreg key. These paths are to allow basic network   
operations such as printing etc to continue as normal.  
  
Index Server 2.0 creates a new "AllowedPath":  
  
HKLM\System\CurrentControlset\Control\ContentIndex\Catalogs  
  
meaning that anyone with an local or domain account for that   
machine, including Guests, are able to discover the physical   
path to directories being indexed or if a directory found in a   
network share is being index they can learn the name of the   
machine on which the share resides and the name of the user   
account used to access that share on behalf of Index and   
Internet Information Server. Permissions on the above key and   
its sub-key give Everyone read access.  
  
Note that regedit and regedt32 can not be used to access this   
information. Tools such as reg.exe or home-baked efforts must   
be used.  
  
In most cases this issue represents a mild risk, but one worth   
noting and resolving by removing if this adversely affects you  
and your security policy.   
  
Cheers,  
David Litchfield  
http://www.infowar.co.uk/mnemonix/  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 1999 00:00Current
7.4High risk
Vulners AI Score7.4
27
.json
Report