CVE-2000-0197
CVSS4.6
发布时间 :2000-02-14 00:00:00
修订时间 :2008-09-10 15:03:16
NMCOS    

[原文]The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.


[CNNVD]NT自动任务/驱动器映射漏洞(CNNVD-200002-045)

        Windows NT调度程序使用目前登录到系统的交互式用户的驱动器映射。本地用户可以通过提供木马批处理文件代替原始批处理文件提升特权。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0197
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0197
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200002-045
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1050
(PATCH)  BID  1050
http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html
(UNKNOWN)  NTBUGTRAQ  20000313 AT Jobs - Denial of serice/Privilege Elevation

- 漏洞信息

NT自动任务/驱动器映射漏洞
中危 其他
2000-02-14 00:00:00 2005-10-20 00:00:00
本地  
        Windows NT调度程序使用目前登录到系统的交互式用户的驱动器映射。本地用户可以通过提供木马批处理文件代替原始批处理文件提升特权。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息

59325
Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
Local Access Required Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2000-03-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

NT Automated Tasks / Drive Mappings Vulnerability
Failure to Handle Exceptional Conditions 1050
No Yes
2000-03-14 12:00:00 2009-07-11 01:56:00
Posted to NTBugtraq on March 14, 2000 by Shawn Wright <swright@sls.bc.ca>.

- 受影响的程序版本

Microsoft Windows NT 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Workstation 4.0
+ Microsoft Windows NT Workstation 4.0

- 漏洞讨论

Any automated task that relies on mapped drives and runs at a higher privelege level than the logged-on user can be exploited by changing the drive mapping. By replicating the directory structure of the intended drive, and replacing the contents of the scheduled executables or configuration files with other data, it is possible for a local attacker to cause arbitrary code to be executed at an elevated privelege level.


For example:
\\Workstation has the following drive mapping:
S: \\Server\Scripts
and there is an AT job that runs S:\Daily.bat every day as the Local Administrator.

Now all the attacker has to do is replace the S: mapping with one that specifies a target where the attacker has write privileges (\\Workstation\C$ for example). Then if the batch file C:\Daily.bat is created, it will be run as Local Administrator.

- 漏洞利用

see discussion

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站