Windows NT RRAS 和 RAS 客户端缓存一个用户的密码漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105345 漏洞类型 信任管理
发布时间 1998-03-19 更新时间 2006-04-19
CVE编号 CVE-1999-0755 CNNVD-ID CNNVD-199905-050
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/19196
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199905-050
|漏洞详情
WindowsNTRRAS和RAS客户端中存在漏洞。即使当用户没有选择“保存密码”选项,WindowsNTRRAS和RAS客户端依然会缓存用户的密码。
|漏洞EXP
source: http://www.securityfocus.com/bid/232/info

Windows NT allows users to save their RAS (and/or RRAS) credentials by using the 'Save Password' checkbox when making a dial-up connection. Credentials saved in this manner are stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasCredentials!SID#0 registry key.

These credentials can be enumerated using the LSA secrets code, as published by Paul Ashton.

If a user does not check the 'save password' checkbox to prevent the password from being stored, RAS will STILL save the successful connection information. This information includes the Dial-up username, phone number, and password, and is stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key.

This infromation can be enumerated using the LSA secrets code.

NOTE: Administrator privileges are needed to execute the LSA secrets code. 

Execute LSA Secrets (or similar) code against the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key. Refer to NT LSA Secrets Vulnerability, July 16,1997 (http://www.exploit-db.com/exploits/19195/)
|参考资料

来源:MS
名称:MS99-017
链接:http://www.microsoft.com/technet/security/bulletin/ms99-017.mspx
来源:MSKB
名称:Q230681
链接:http://support.microsoft.com/default.aspx?scid=kb;%5BLN%5D;Q230681