Microsoft Windows SMB Registry : Key Permission Weakness Admin Privilege Escalation

High Nessus Plugin ID 10430


Local users can gain administrator privileges.


The following keys contain the name of the program that shall be started when the computer starts. The users who have the right to modify them can easily make the admin run a Trojan program that will give them admin privileges.


Use regedt32 and set the permissions of this key to :

- Admin group : Full Control
- System : Full Control
- Everyone : Read

Make sure that 'Power Users' do not have any special privilege for this key.

Plugin Details

Severity: High

ID: 10430

File Name: smb_reg_run_permissions.nasl

Version: $Revision: 1.35 $

Type: local

Agent: windows

Family: Windows

Published: 2000/05/29

Modified: 2015/12/04

Dependencies: 10150, 10400, 10394

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/transport, SMB/name, SMB/login, SMB/password, SMB/registry_access

Vulnerability Publication Date: 1997/10/17

Reference Information

CVE: CVE-1999-0589

OSVDB: 331, 332, 334