SecHole lets non-administrative users gain Debug Level access |
---|
Risk Level: | High | Check or Attack Name: NTPrivFix |
---|---|---|
Platforms: | Windows NT: 3.5, Windows NT: 4.0 | |
Description: | The sechole.exe utility circulated on the Internet can allow a non-administrative user to gain debug-level access on a system process. Using this utility, the non-administrative user may run some code in the system security context and acquire local administrative privileges on the system. |
|
Remedy: | Apply the latest Windows NT 4.0 Service Pack. To apply the latest Windows NT Service Pack, follow these steps:
Windows NT 4.0 Service Pack 3 (SP3) users must apply the post-SP3 priv-fix patch available from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/priv-fix/. —OR—Windows NT 3.51 SP5 customers can download the patch from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT351/hotfixes-postSP5/priv-fix/. |
|
References: | Microsoft Knowledge Base Article Q190288, SecHole Lets Non-administrative Users Gain Debug Level Access, http://support.microsoft.com/support/kb/articles/q190/2/88.asp Microsoft Knowledge Base Article Q190288, SecHole Lets Non-administrative Users Gain Debug Level Access, ftp://ftp.microsoft.com/bussys/winnt/winnt public/fixes/usa/NT40/hotfixes-postSP3/priv-fix/Q190288.TXT hotfixes-postSP5/priv-fix/. Microsoft Knowledge Base Article Q190288, SecHole Lets Non-administrative Users Gain Debug Level Access, ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT351/hotfixes-postSP5/priv-fix/Q190288.TXT otfixes-postSP3/priv-fix/ Microsoft Security Bulletin MS98-009, Update Available for Windows NT Privilege Elevation attack, http://www.microsoft.com/security/bulletins/ms98-009.asp |
Know Your Risks |