[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nessus-plugins-writers
Subject:    MS02-024 plugin
From:       "Michael Scheidell" <scheidell () secnap ! net>
Date:       2002-05-23 1:22:24
Message-ID: 200205230122.g4N1MOJ33101 () scanner ! secnap ! net
[Download RAW message or body]

This is a multi-part message in MIME format.

--_----------=_1088641830461156
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain

New plugin to detect flaw in Microsoft debugger that allows any logged on
user to gain administrative plrvledges.


This vulnerability is the result of a flaw in the authentication mechanism
for the Windows debugging facility that allows unauthorized program can
gain access to the debugger. Download now to prevent a malicious user from
gaining elevated privileges through the debugging facility, and then
running code of her choice on your computer.


--=20
Michael Scheidell SECNAP
Network Security, LLC
(561) 368-9561 scheidell@secnap.net
http://www.secnap.net/


--_----------=_1088641830461156
Content-Disposition: inline; filename="smb_nt_ms02-024.nasl"
Content-Length: 2038
Content-Transfer-Encoding: binary
Content-Type: text/plain; name="smb_nt_ms02-024.nasl"

#
# This script was written by Michael Scheidell <scheidell at secnap.net>
#
# See the Nessus Scripts License for details
#
if(description)
{
 script_cve_id("CAN-2002-0367");
 name["english"] = "Windows Debugger flaw can Lead to Elevated Privileges (Q320206)";
 
 script_name(english:name["english"]);
 
 desc["english"] = "
Authentication Flaw in Windows Debugger can Lead to Elevated 
Privileges (Q320206)

Impact of vulnerability: Elevation of Privilege 

Affected Software: 

Microsoft Windows NT 4.0 
Microsoft Windows NT 4.0 Server, Terminal Server Edition 
Microsoft Windows 2000 

Recommendation: Users using any of the affected
products should install the patch immediately.

Maximum Severity Rating: Critical 

See
http://www.microsoft.com/technet/security/bulletin/ms02-024.asp

Risk factor : High";

 script_description(english:desc["english"]);
 
 summary["english"] = "Checks for MS Hotfix Q320206, Elevated Privilege";

 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2002 Michael Scheidell");
 family["english"] = "Windows";
 script_family(english:family["english"]);
 
 script_dependencies("netbios_name_get.nasl",
 		     "smb_login.nasl","smb_registry_access.nasl",
		     "smb_reg_service_pack.nasl",
		     "smb_reg_service_pack_W2K.nasl");
 script_require_keys("SMB/name", "SMB/login", "SMB/password",
		     "SMB/registry_access","SMB/WindowsVersion");
 script_exclude_keys("SMB/XP/ServicePack");
 script_require_ports(139);
 exit(0);
}

include("smb_nt.inc");

access = get_kb_item("SMB/registry_access");
if(!access)exit(0);

version = get_kb_item("SMB/WindowsVersion");

if(version >< "5.0")
{
# fixed in Service Pack 3
 sp = get_kb_item("SMB/Win2K/ServicePack");
 if(ereg(string:sp, pattern:"Service Pack [3-9]"))exit(0);
}

if(version >< "5.1")exit(0);

key = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\HotFix\Q320206";
item = "Comments";
value = registry_get_sz(key:key, item:item);
if(!value)security_hole(139);


--_----------=_1088641830461156--


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic