Microsoft Windows SMB Registry : Key Permission Weakness Admin Privilege Escalation

high Nessus Plugin ID 10430

Synopsis

Local users can gain administrator privileges.

Description

The following keys contain the name of the program that shall be started when the computer starts. The users who have the right to modify them can easily make the admin run a Trojan program that will give them admin privileges.

Solution

Use regedt32 and set the permissions of this key to :

- Admin group : Full Control
- System : Full Control
- Everyone : Read

Make sure that 'Power Users' do not have any special privilege for this key.

Plugin Details

Severity: High

ID: 10430

File Name: smb_reg_run_permissions.nasl

Version: 1.36

Type: local

Agent: windows

Family: Windows

Published: 5/29/2000

Updated: 8/13/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/name, SMB/login, SMB/password, SMB/registry_access, SMB/transport

Vulnerability Publication Date: 10/17/1997

Reference Information

CVE: CVE-1999-0589