Microsoft Windows NT 4.0 – DCOM Server

Microsoft Windows NT 4.0 – DCOM Server

漏洞ID 1053413 漏洞类型
发布时间 1999-09-08 更新时间 1999-09-08
图片[1]-Microsoft Windows NT 4.0 – DCOM Server-安全小百科CVE编号 N/A
图片[2]-Microsoft Windows NT 4.0 – DCOM Server-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19489
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/624/info


It is possible for a local user to modify how DCOM servers are run, thereby escalating his/her privilege level. The Interactive User has write permissions to the DCOM registry entries. By editing the registry keys associated with DCOM server applications, they can change which services are started to handle specific events. They can then overwrite the services EXE file, trigger the event, and have their code run as SYSTEM. 


This exploit will cause the System Event Notification service or SENS service to start when a VBScript calls for the creation of a new Wordpad Document. The SENS service is installed during an installation of IE5, but is not started. The default permissions allow Everybody write access to the EXE.
Edit the
HKCRAppID{73FDDC80-AEA9-101A-98A7-00AA00374959}
registry key and add a new value, "LocalService", with data SENS

Create an HTML document, with the following VBScript in it:
<SCRIPT LANGUAGE="VBScript"> CreateObject("Wordpad.Document.1") </SCRIPT>

Open the html document in a browser. The browser will request that the COM Service Control Manager (RPCSS.EXE) start the service associated with Wordpad.

相关推荐: Multiple Vendor Linux deliver 2.0.12 and below Buffer Overflow Vulnerabilities

Multiple Vendor Linux deliver 2.0.12 and below Buffer Overflow Vulnerabilities 漏洞ID 1105003 漏洞类型 Boundary Condition Error 发布时间 199…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享