发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:27:58

[原文]IIS 4.0 allows local users to bypass the "User cannot change password" policy for Windows NT by directly calling .htr password changing programs in the /iisadmpwd directory, including (1) aexp2.htr, (2) aexp2b.htr, (3) aexp3.htr , or (4) aexp4.htr.

[CNNVD]Microsoft Windows NT安全策略被绕过漏洞(CNNVD-200208-168)

        微软IIS是Windows平台上的一种WEB Server。
        IIS 4.0有一个远程可访问目录/IISADMPWD,包含了一些.HTR文件。这些文件最初设计用于为系统管理员提供基于HTTP的网络用户口令修改机制。提交对.HTR文件的请求,将返回一个表单,让用户输入帐号名、当前口令、准备使用的新口令。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_nt:4.0:sp1:serverMicrosoft Windows 4.0 sp1 server
cpe:/o:microsoft:windows_nt:4.0:sp5:serverMicrosoft Windows 4.0 sp5 server
cpe:/o:microsoft:windows_nt:4.0:sp6:serverMicrosoft Windows 4.0 sp6 server
cpe:/o:microsoft:windows_nt:4.0:sp2:serverMicrosoft Windows 4.0 sp2 server
cpe:/o:microsoft:windows_nt:4.0:sp3:serverMicrosoft Windows 4.0 sp3 server
cpe:/o:microsoft:windows_nt:4.0:sp6a:serverMicrosoft Windows 4.0 sp6a server
cpe:/o:microsoft:windows_nt:4.0:sp4:serverMicrosoft Windows 4.0 sp4 server

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  winnt-pw-policy-bypass(8388)
(VENDOR_ADVISORY)  BUGTRAQ  20020306 NT user (who is locked changing his/her password by administrator ) can bypass the security policy and Change the password.

- 漏洞信息

Microsoft Windows NT安全策略被绕过漏洞
中危 设计错误
2002-08-12 00:00:00 2005-10-20 00:00:00
        微软IIS是Windows平台上的一种WEB Server。
        IIS 4.0有一个远程可访问目录/IISADMPWD,包含了一些.HTR文件。这些文件最初设计用于为系统管理员提供基于HTTP的网络用户口令修改机制。提交对.HTR文件的请求,将返回一个表单,让用户输入帐号名、当前口令、准备使用的新口令。

- 公告与补丁

        * 由于.HTR技术本身存在重大安全隐患,微软不打算就此问题给出其它解决方案,它们建议取消对.HTR的映射,转用微软活动目录服务接口(ADSI)处理类似请求。

- 漏洞信息

Microsoft IIS aexp2.htr Password Policy Bypass
Remote / Network Access Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

Microsoft IIS installs the /iisadmpwd/aexp2.htr file by default, which can be used by an attacker to brute force a valid username/password. A valid user may also use it to change a password on a locked account or bypass the administrator security policy "user cannot change password".

- 时间线

2002-03-06 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Remove the HTR ISAPI filter mapping from IIS and use Microsoft Active Directory Service Interfaces (ADSI) for handling accounts remotely.

- 相关参考

- 漏洞作者

- 漏洞信息

Microsoft Windows NT Security Policy Bypass Vulnerability
Design Error 4236
Yes No
2002-03-06 12:00:00 2009-07-11 10:56:00
Reported by Syed Mohamed A <>.

- 受影响的程序版本

Microsoft Windows NT Server 4.0 SP6a
+ Avaya DefinityOne Media Servers
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
+ Avaya S8100 Media Servers 0
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0

- 漏洞讨论

Microsoft IIS is a popular web server package for Windows NT based platforms. Version 4.0 of IIS installs a remotely accessible directory, /IISADMPWD, which contains a number of vulnerable .HTR files. These are designed to allow system administrators the ability to provide HTTP based password change services to network users. Requesting one of the .htr files returns a form that requests the account name, current password, and changed password.

An issue has been reported which could allow NT users, with their local security policy set to "User cannot change password", to change their password via IISADMPWD.

- 漏洞利用

No exploit code required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考