Windows NT null session user modals |
---|
Risk Level: | Low | Check or Attack Name: Null Session User Modals |
---|---|---|
Platforms: | Windows NT | |
Description: | Password policy information is available to non-authenticated users for all Windows NT systems prior to NT 4.0 with Service Pack 3 and the lsa2-fix. An attacker can access valuable information regarding password length, number of incorrect passwords before a user is locked out, and duration of user lockout. |
|
Remedy: | Apply the latest Windows NT 4.0 Service Pack:
—OR— Windows NT 4.0 SP3 users must apply the post-SP3 lsa2-fix patch available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/lsa2-fix/. —AND— The RestrictAnonymous key must be set to restrict password policy information: WARNING: Incorrectly using Registry Editor may cause severe and irreparable damage and may require you to reinstall your operating system. Internet Security Systems cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk.
Note: Changing the Registry entries is only effective after applying the latest Service Pack, or after applying the post-SP3 lsa2-fix patch and Service Pack 3. |
|
References: | Microsoft Knowledge Base Article Q129457, Anonymous Connections May Be Able to Obtain the Password Policy, http://support.microsoft.com/support/kb/articles/q129/4/57.asp |
Know Your Risks |