Microsoft Windows SMB Registry : Key Permissions Path Subversion Local Privilege Escalation

high Nessus Plugin ID 10432

Synopsis

Local users can gain SYSTEM privileges.

Description

Some SYSTEM registry keys can be written by non administrator.

These keys contain paths to common programs and DLLs. If a user can change a path, then he may put a trojan program into another location (say C:/temp) and point to it.

Solution

Use regedt32 and set the permissions of this key to :

- admin group : Full Control
- system : Full Control
- everyone : Read

Plugin Details

Severity: High

ID: 10432

File Name: smb_reg_trojan_paths.nasl

Version: 1.36

Type: local

Agent: windows

Family: Windows

Published: 5/30/2000

Updated: 8/13/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/name, SMB/login, SMB/password, SMB/registry_access, SMB/transport

Reference Information

CVE: CVE-1999-0589