RE: [Full-disclosure] Flaw in Microsoft Domain Account Caching

看板Bugtraq作者時間15年前 (2010/12/14 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/3 (看更多)
In whose universe? Did you even read the post? Local admins become LOCAL= ADMINS by using a cached domain account who is a LOCAL ADMIN. You have to = do it with the network cable unplugged. There is no privilege escalation = here.=20 StenoPlasma's intent was to educate people on how things worked, and while = there isn't a security issue here, he was completely correct in that you gu= ys really need to learn what you are talking about. =20 t >-----Original Message----- >From: full-disclosure-bounces@lists.grok.org.uk [mailto:full-disclosure- >bounces@lists.grok.org.uk] On Behalf Of jcoyle@winwholesale.com >Sent: Friday, December 10, 2010 11:45 AM >To: Stefan Kanthak >Cc: stenoplasma@exploitdevelopment.com; full-disclosure@lists.grok.org.uk; >bugtraq@securityfocus.com >Subject: Re: [Full-disclosure] Flaw in Microsoft Domain Account Caching Al= lows >Local Workstation Admins to Temporarily Escalate Privileges and Login as >Cached Domain Admin Accounts (2010-M$-002) > >You are completely missing the point.. >Local admins become Domain Admins. > > > > > >From: "Stefan Kanthak" <stefan.kanthak@nexgo.de> >To: <bugtraq@securityfocus.com>, > <full-disclosure@lists.grok.org.uk> >Cc: <stenoplasma@exploitdevelopment.com> >Date: 12/10/2010 01:08 PM >Subject: Re: Flaw in Microsoft Domain Account Caching Allows Local > Workstation Admins to Temporarily Escalate Privileges and Logi= n > as Cached Domain Admin Accounts (2010-M$-002) > > > >"StenoPlasma @ www.ExploitDevelopment.com" wrote: > >Much ado about nothing! > >> TITLE: >> Flaw in Microsoft Domain Account Caching Allows Local Workstation >> Admins to Temporarily Escalate Privileges and Login as Cached Domain >> Admin Accounts > >There is NO privilege escalation. A local administrator is an admistrator = is an >administrator... > >> SUMMARY AND IMPACT: >> All versions of Microsoft Windows operating systems allow real-time >> modifications to the Active Directory cached accounts listing stored >> on all Active Directory domain workstations and servers. This allows >> domain users that have local administrator privileges on domain assets >> to modify their cached accounts to masquerade as other domain users >> that have logged in to those domain assets. This will allow local >> administrators to temporarily escalate their domain privileges on >> domain workstations or servers. > >Wrong. The local administrator is already local administrator. There's not= hing >the elevate any more. > >> If the local administrator masquerades as an Active Directory Domain >> Admin account, the modified cached account is now free to modify >> system files and user account profiles using the identity of the >> Domain Admin's account. > >There is no need to masquerade: the local administrator can perform all th= ese >modifications, and if s/he wishes, hide the tracks: turn off auditing befo= re, >clear audit/event logs afterwards, change the SID in the ACEs of all objec= ts >touched (SubInACL.Exe comes handy), ... > >Or: just change the "NoDefaultAdminOwner" setting. After that, all >"Administrators" masquerade as "Administrators". uh-oh. > >> This includes >> creating scripts to run as the Domain Admin account the next time that >> they log in. > >Ridiculous. >A local administrator can add any script/executable s/he wants to any >"autostart" (scheduled task, registry, logon script, userinit, shell, ...)= .. >There's ABSOLUTELY no need to masquerade. > >> All files created will not be linked to your domain account in file >> and folder access lists. > >ACEs can always be edited by a local administrator, see SubInACL.Exe, or >TakeOwn.Exe. > >> All security access lists >> will only show the Domain Admin's account once you log out of the >> modified cached account. This leads to a number of security issues >> that I will not attempt to identify in the article. One major issue is >> the lack of non-repudiation. Editing files and other actions will be >> completed as another user account. Event log entries for object access >> will only be created if administrators are auditing successful access >> to files (This will lead to enormous event log sizes). > >A local administrator can turn audit/event logs off, clear or modify them. > >Stefan > > > > >*********************************************************** >********************************** >This email message and any attachments is for use only by the named >addressee(s) and may contain confidential, privileged and/or proprietary >information. If you have received this message in error, please immediate= ly >notify the sender and delete and destroy the message and all copies. All >unauthorized direct or indirect use or disclosure of this message is stric= tly >prohibited. No right to confidentiality or privilege is waived or lost by= any >error in transmission. >*********************************************************** >********************************** > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html >Hosted and sponsored by Secunia - http://secunia.com/
文章代碼(AID): #1D1bzYQR (Bugtraq)
文章代碼(AID): #1D1bzYQR (Bugtraq)