CVE-2001-0046
CVSS4.6
发布时间 :2001-02-16 00:00:00
修订时间 :2008-09-10 15:07:05
NMCOS    

[原文]The default permissions for the SNMP Parameters registry key in Windows NT 4.0 allows remote attackers to read and possibly modify the SNMP community strings to obtain sensitive information or modify network configuration, aka one of the "Registry Permissions" vulnerabilities.


[CNNVD]Microsoft Windows NT 4.0 / 2000 SNMP注册码修改漏洞(CNNVD-200102-080)

        Windows NT 4.0版本的SNMP参数注册码的默认许可存在漏洞。远程攻击者读取和可能修改SNMP团体字符串获得敏感信息或者修改网络配置,也称为“注册许可”漏洞之一。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_2000Microsoft Windows 2000
cpe:/o:microsoft:windows_nt:4.0Microsoft Windows NT 4.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:139Default Registry Permissions on SNMP Parameters
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0046
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0046
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200102-080
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2066
(VENDOR_ADVISORY)  BID  2066
http://www.microsoft.com/technet/security/bulletin/MS00-095.asp
(VENDOR_ADVISORY)  MS  MS00-095
http://xforce.iss.net/static/5672.php
(VENDOR_ADVISORY)  XF  nt-snmp-reg-perms

- 漏洞信息

Microsoft Windows NT 4.0 / 2000 SNMP注册码修改漏洞
中危 配置错误
2001-02-16 00:00:00 2005-10-20 00:00:00
本地  
        Windows NT 4.0版本的SNMP参数注册码的默认许可存在漏洞。远程攻击者读取和可能修改SNMP团体字符串获得敏感信息或者修改网络配置,也称为“注册许可”漏洞之一。

- 公告与补丁

        Microsoft has released a patch which rectifies this issue:
        Microsoft Windows 2000 Advanced Server SP1
        
        Microsoft Windows 2000 Professional
        
        Microsoft Windows 2000 Professional SP1
        
        Microsoft Windows 2000 Server SP1
        
        Microsoft Windows 2000 Advanced Server
        
        Microsoft Windows 2000 Server
        
        Microsoft Windows NT Terminal Server 4.0
        
        Microsoft Windows NT Workstation 4.0 SP6a
        
        Microsoft Windows NT Workstation 4.0 SP5
        
        Microsoft Windows NT Enterprise Server 4.0 SP5
        
        Microsoft Windows NT Server 4.0 SP6a
        
        Microsoft Windows NT Enterprise Server 4.0 SP6a
        
        Microsoft Windows NT Server 4.0 SP5
        
        Microsoft Windows NT Terminal Server 4.0 SP5
        

- 漏洞信息

10648
Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
Local Access Required Misconfiguration
Loss of Integrity Workaround

- 漏洞描述

- 时间线

2000-12-06 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows NT 4.0 / 2000 SNMP Registry Key Modification Vulnerability
Configuration Error 2066
No Yes
2000-12-06 12:00:00 2009-07-11 03:56:00
Discovered by Chris Anley from @stake (http://www.atstake.com) and posted in a Microsoft Security Bulletin (MS00-095) and (MS00-096) on Dec 6, 2000.

- 受影响的程序版本

Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Terminal Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP5
Microsoft Windows NT Terminal Server 4.0 SP4
Microsoft Windows NT Terminal Server 4.0 SP3
Microsoft Windows NT Terminal Server 4.0 SP2
Microsoft Windows NT Terminal Server 4.0 SP1
Microsoft Windows NT Terminal Server 4.0
Microsoft Windows NT Server 4.0 SP6a
+ Avaya DefinityOne Media Servers
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
+ Avaya S8100 Media Servers 0
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0
Microsoft Windows NT Enterprise Server 4.0 SP6a
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows NT 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Enterprise Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Terminal Server 4.0
+ Microsoft Windows NT Workstation 4.0
+ Microsoft Windows NT Workstation 4.0
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server

- 漏洞讨论

The SNMP protocol in Windows NT4 and 2000 enables an administrator to manage network devices remotely.

The SNMP parameters key in the registry stores community name and management station identifiers. Unfortunately this information is readable by all users, allowing malicious users to pose as a management station for any communities belonged to. The key settings are typically modified by a user with administrative privileges, due to a default configuration error the SNMP Registry Key permits any user, that is logged into that particular machine, to edit the settings. By editing the parameters key, a user could in theory create a new community with management privileges for themselves.

Successful exploitation of this vulnerability could allow a user to gain full control of network devices and other resources managed via SNMP.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Microsoft has released a patch which rectifies this issue:


Microsoft Windows 2000 Advanced Server SP1

Microsoft Windows NT Terminal Server 4.0

Microsoft Windows NT Workstation 4.0 SP6a

Microsoft Windows NT Workstation 4.0 SP5

Microsoft Windows NT Enterprise Server 4.0 SP5

Microsoft Windows NT Server 4.0 SP6a

Microsoft Windows 2000 Professional

Microsoft Windows 2000 Professional SP1

Microsoft Windows NT 4.0

Microsoft Windows NT Enterprise Server 4.0 SP6a

Microsoft Windows 2000 Server SP1

Microsoft Windows NT Server 4.0 SP5

Microsoft Windows NT Terminal Server 4.0 SP5

Microsoft Windows 2000 Advanced Server

Microsoft Windows 2000 Server

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站