Shares enumerated through a null session |
---|
Risk Level: | Medium | Check or Attack Name: NetBIOS shares - null session |
---|---|---|
Platforms: | Windows NT | |
Description: | Users or shares were detected using a null session. A null session is a NetBIOS connection established with a zero length string as user, password, and domain name, which is designed to enable enumeration of shares and users. This capability has always been present in Windows NT, but was discovered to allow access to the registry with the same level of permissions as the Everyone group. It is a medium risk vulnerability (similar to finger) that allows users and shares to be enumerated. |
|
Remedy: | Windows NT 4.0 users must first apply the latest Windows NT 4.0 Service Pack or the post-SP2 sec-fix patch described later, remove all unnecessary shares, and restrict anonymous connections. Note: The vulnerability will be flagged if any shares are detected, even if they are not accessible. Windows 95 machines must disable file and print sharing to avoid flagging this vulnerability. If shares are needed and must be secure, consider upgrading to Windows NT running NTFS. Windows 95: To remove file and print sharing:
Windows NT: Perform the following actions: Remove unnecessary shares. Choose one of these options:
—AND— Apply the latest Windows NT 4.0 Service Pack. Go to http://support.microsoft.com/support/ntserver/Content/ServicePacks/ and follow the directions to download the appropriate service pack for your computer. Windows NT 4.0 Service Pack 2 (SP2) users must apply the sec-fix patch available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP2/sec-fix/. —AND— Restrict anonymous connections by changing the registry. To restrict anonymous connections in Windows NT: WARNING: Incorrectly using Registry Editor may cause severe and irreparable damage and may require you to reinstall your operating system. Internet Security Systems cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk.
Note: Changing the Registry entries is only effective after applying the post-SP2 sec-fix patch or the latest Windows NT Servic |
|
References: | Microsoft Knowledge Base Article Q143475, Windows NT System Key Permits Strong Encryption of the SAM, http://support.microsoft.com/support/kb/articles/q143/4/75.asp Microsoft Knowledge Base Article Q155363, HOWTO: Regulate Network Access to the Windows NT Registry, http://support.microsoft.com/support/kb/articles/q155/3/63.asp hotfixes-postSP2/sec-fix/Q143474.TXT Microsoft Knowledge Base Article Q143474, Restricting Information Available to Anonymous Logon Users, http://support.microsoft.com/support/kb/articles/q143/4/74.asp Microsoft Knowledge Base Article Q143474, Restricting Information Available to Anonymous Logon Users, ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP2/sec-fix/Q143474.txt Microsoft Knowledge Base Article Q143475, Windows NT System Key Permits Strong Encryption of the SAM, ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP2/sec-fix/Q143475.txt hotfixes-postSP2/sec-fix/Q143475.TXT |
Know Your Risks |