发信人: PowerStation.bbs@bbs.sjtu.edu.cn (Warez Killer), 信区: cnhacker
标 题: WindowsNT的25个漏洞 (4)
发信站: 饮水思源站 (Sun Apr 6 02:44:30 1997)
转信站: Lilac!ustcnews!ustcnews!sjtunews!sjtubbs
出 处: bbs.sjtu.edu.cn
(7)MS Access SIDs
3.5, 3.51, 4.0
A User SID is easily read from a MS Access v1.0 database and copied over
a SID in the MSysAccounts table in the Systerm Data Base (SystemDB),
allowing anyone to access a database with the permissions of another user.
This is only effective on a system that has both MS Access v1.0 and v2.0
databases, and is exploited by open ing a v1.0 database using MS Access
v2.0. Of course v1.0 does'nt really care about permissions so that should be
doable as well .
(8)Rollback.exe
4.0
Ok this one was just stupidity on Microsoft' s part. Rollback.exe was a file
that was put on the NT 4.0 CD for OEM's and software companies so that
they could revert a NT box back to an unmodified state. Microsoft forgot
to take it off the CD when it went into the commercial market, and stupid
MS users who did'nt know what it was executed it destroying all the changes
they had made. It has to be run as Administrator (makes you think), and is
no longer on any of the more recient CDs, but I thought it was amusing and
worth a mention. Send it to a friend and tell him/her its a really cool game !!!
(9)MS Word/Excel Macro virus
3.5, 3.51, 4.0
These kind of holes maybe couldn't be seemed as only for windows NT, but
they do exist.
(10)Executable .doc files
4.0
A strange little bug will allow an executable files to be renamed as .doc files
and still run as an executable from the command line.
--
※ 来源:·饮水思源站 bbs.sjtu.edu.cn·[FROM: gos.oz.cc.utah.]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:2.054毫秒