发布时间 :1999-05-25 00:00:00
修订时间 :2016-10-17 22:04:16

[原文]IBM Netfinity Remote Control allows local users to gain administrator privileges by starting programs from the process manager, which runs with system level privileges.

[CNNVD]NT IBM Netfinity远程控制软件中的漏洞(CNNVD-199905-044)

        IBM Netfinity 远程控制中存在漏洞。本地用户通过启动运行在系统级权限下的进程管理器中的程序获得管理员权限。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  NTBUGTRAQ  19990525 Security Leak with IBM Netfinity Remote Control Software
(UNKNOWN)  NTBUGTRAQ  19990609 IBM's response to "Security Leak with IBM Netfinity Remote Control Software

- 漏洞信息

NT IBM Netfinity远程控制软件中的漏洞
高危 未知
1999-05-25 00:00:00 2005-05-02 00:00:00
        IBM Netfinity 远程控制中存在漏洞。本地用户通过启动运行在系统级权限下的进程管理器中的程序获得管理员权限。

- 公告与补丁

        Do not run the IBM Remote Control Software application or client modules on your NT hosts.
        IBM will be releasing a patch for this vulnerability. In the meantime, IBM suggests:
        Set NTFS LIST permissions over the WNETFIN directory. This will prevent users from executing the Netfinity Manager Services.
        Use Netfinity Security Manager to restrict access to Process Manager and Remote Session.
        Configure the Netfinity Manager Services to start with a non-administrator level user account.
        Audit the activities of the service-user account.
        Do not install Netfinity Manager Services on client machines. Only install Client Services for Netfinity Manager on client machines.
        Prevent the installation of Process Manager and Remote Session by editing the INSTALL.INI file.

- 漏洞信息 (19227)

IBM Remote Control Software 1.0 Vulnerability (EDBID:19227)
windows local
1999-05-10 Verified
0 Thomas Krug
N/A [点击下载]

The IBM Remote Control Software package requires a client module to be loaded on NT hosts to be remotey controlled. This client module is loaded as an NT service and must run under either the local system account or the user context of a user account having administrative privileges.

It has been discovered that this service may be exploited by a local user level account to execute code with administrator privileges. This vulnerability would allow a user (with no admin rights) to execute programs that might allow them to elevate their privileges to that of an administrator. 

Open the Netfinity client. Launch the Process Manager. From the Process Manager interface, launch arbitrary code. usrmgr.exe, musrmgr.exe, regedt32.exe, etc. may be launched and be used by the user level account to grant administrator privileges to any account on the host (or domain). 		

- 漏洞信息

NT IBM Netfinity Remote Control Software Privilege Escalation
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-05-25 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, IBM has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete