发信人: PowerStation.bbs@bbs.sjtu.edu.cn (Warez Killer), 信区: cnhacker
标 题: WindowsNT的25个漏洞 (5)
发信站: 饮水思源站 (Sun Apr 6 02:48:18 1997)
转信站: Lilac!ustcnews!ustcnews!sjtunews!sjtubbs
出 处: bbs.sjtu.edu.cn
Ebedded Problems
(11)Default Permissions
4.0
If you install an NT 4.0 workstation or server, the default permissions on the
system partition as reported by Explorer are:
Eeryone Full Control (All) (All)
This means that building a secure, restricted-use workstation is difficult, and
that if a server becomes compromised at the share level (eg through SMB
bugs) there is no underlying file permission protection.
Note that the group Everyone includes the unpassworded Guest account
(12)NTFS
3.5x 4.0
NTFS, the NTFile System, poses a few problems for securityof its own. This
one was published in the Nov. 96 issue of NT magazine. The problem resides in
the file permissions that NTFSuses.
"If you set a file to R (read-only) access for Everyone, users can still delete the
file although Everyone lacks D (delete) access. Apparently, MS has no plans
to fill this hole."
It doesn't matter who it is set to read-only. The file can be read-only
administrators, and I can still delete it. Plus, even if you go into "special"
permissions", and remove the execute flag, it can still be deleted.
[c:\]cacls foo
C:\foo BUILTIN\Administrators:R
[c:\]del foo
Deleting C:\foo
1 file deleted 1,536 bytes freed
[c:\]dir foo
Volume in drive C is unlabeled Serial number is 8494:9621
4DOS/NT: The system cannot find the file specified.
"C:\foo"
bytes in 0 files and 0 dirs
265,867,776 bytes free
This would allow any user who has read access to a file to delete it, and replace it with a trojan.
--
※ 来源:·饮水思源站 bbs.sjtu.edu.cn·[FROM: gos.oz.cc.utah.]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:5.177毫秒