Microsoft Windows SMB Registry : Key Permissions Path Subversion Local Privilege Escalation

High Nessus Plugin ID 10432


Local users can gain SYSTEM privileges.


Some SYSTEM registry keys can be written by non administrator.

These keys contain paths to common programs and DLLs. If a user can change a path, then he may put a trojan program into another location (say C:/temp) and point to it.


Use regedt32 and set the permissions of this key to :

- admin group : Full Control
- system : Full Control
- everyone : Read

Plugin Details

Severity: High

ID: 10432

File Name: smb_reg_trojan_paths.nasl

Version: $Revision: 1.35 $

Type: local

Agent: windows

Family: Windows

Published: 2000/05/30

Modified: 2015/12/15

Dependencies: 10400, 10394, 10150

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/transport, SMB/name, SMB/login, SMB/password, SMB/registry_access

Reference Information

CVE: CVE-1999-0589

OSVDB: 334