NSFOCUS Security Advisory(SA2000-05)
          Topic�� Microsoft Windows 9x NETBIOS password verification
                                vulnerability
                        Release Date�� August 24, 2000
                              Affected System��
                               ================
                            - Microsoft Windows 95
                            - Microsoft Windows 98
                    - Microsoft Windows 98 Second Edition
                            Non-affected System��
                             ====================
                               - Windows NT 4.0
                                - Windows 2000
                                   Impact:
                                  ==========
    A vulnerability exists in the password verification scheme utilized by
          Microsoft Windows 9x NETBIOS protocol implementation. This
    vulnerability will allow any user to access the Windows 9x file shared
      service with password protection. Attacker don't have to know the
                               share password.
                                Description��
                                =============
     You can set password to protect Microsoft Windows 9x system's shared
      resources. But a vulnerability exists in the password verification
           scheme utilized by Microsoft Windows 9x NETBIOS protocol
      implementation. To verify the password, the length of the password
    depends on the length of the data sent from client to server. That is,
       if a client set the length of password to be 1 byte and send the
    packet to server, the server will only compare it with the first byte
      of the shared password, and if consistent, verification process is
    done. All an attacker need to do is to guess and try the first byte of
                           password in the victim .
     Windows 9x remote management system is also affected cause it adopts
               the same shared password authentication method.
                                 Workaround��
                                  =========
                     Close Microsoft file shared service.
                         Microsoft has been informed.
                                  DISCLAIMS:
                                  ==========
       THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT
    WARRANTY OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS
       OR IMPLIED, EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO
      EVENTSHALL NSFOCUS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING
     DIRECT, INDIRECT, INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS
         OR SPECIAL DAMAGES, EVEN IF NSFOCUS HAS BEEN ADVISED OF THE
       POSSIBILITY OF SUCH DAMAGES. DISTRIBUTION OR REPRODUTION OF THE
    INFORMATION IS PROVIDED THAT THE ADVISORY IS NOT MODIFIED IN ANY WAY.
       �Coypright 1999-2000 NSFOCUS. All Rights Reserved. Terms of use.
                 NSFOCUS Security Team <[EMAIL PROTECTED]>
                    NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
                           (http://www.nsfocus.com)

      �Copyright 2000 NSFOCUS Information Technology Co.,Ltd. All Rights
                                  Reserved.
                        Contact:[EMAIL PROTECTED]


----
post: [EMAIL PROTECTED]
url: http://theMezz.com/informant
forum: http://theMezz.com/bbs
subscribe: [EMAIL PROTECTED]
unsubscribe: [EMAIL PROTECTED]
digest: [EMAIL PROTECTED]
notDigest: [EMAIL PROTECTED]

___________________________________________________________
T O P I C A  The Email You Want. http://www.topica.com/t/16
Newsletters, Tips and Discussions on Your Favorite Topics

Reply via email to