HOT FIX for NT 4.0 .... What for????

HOT FIX for NT 4.0 .... What for????

Post by Chri » Wed, 23 Apr 1997 04:00:00



Recently, I got the following Hot Fix, could anyone tell me what for?
Is it the same as SP3 :

a.  DNS Fix
b.  IIS Fix
c.  RAS Fix
d.  RPC Fix
e.  Serial Fix
f.  SFMSVR fix
g. TCP/IP fix

Chris

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Bill Starbuc » Wed, 23 Apr 1997 04:00:00


These are not the same thing as SP3, but they will be included in SP3.
Each has one or two explanatory documents that tell what it fixes, and
whence whether you should bother to install them.  Basically, you should
install a hotfix ONLY if you have reason to believe that it will correct a
problem you are having.

There's at least one other hot fix that can be more important than the ones
you have -- NTOSKRNL.

If you don't have the documents that explain these things, you can
      1. go to the KnowledgeBase and search for "hot fix", or
      2. go the ftp.microsoft.com and find the directory that holds these
hot fixes.

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Stephen Feathe » Wed, 23 Apr 1997 04:00:00


Hmm...

        The RPC prevents a dangerous bug, that one could telnet to the rcp port,
pass it garbage characters, and send CPU usage through the sky...

        Similar on the IIS fix also...

        Can't remember the rest off the top of my head...



Quote:> Recently, I got the following Hot Fix, could anyone tell me what for?
> Is it the same as SP3 :

> a.  DNS Fix
> b.  IIS Fix
> c.  RAS Fix
> d.  RPC Fix
> e.  Serial Fix
> f.  SFMSVR fix
> g. TCP/IP fix

> Chris

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Ingo Molna » Fri, 25 Apr 1997 04:00:00



: Recently, I got the following Hot Fix, could anyone tell me what for?
: Is it the same as SP3 :

: a.  DNS Fix
: b.  IIS Fix
: c.  RAS Fix
: d.  RPC Fix
: e.  Serial Fix
: f.  SFMSVR fix
: g. TCP/IP fix

you got to have at least these to get around some of the public security
holes present in NT 4.0. And you need lotsa luck to get around the
nonfixed and the nonpublic ones ;)

eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
fixes yet, ie. anyone from the net can just download all your security
files and crack passwords with a good chance.

-- mingo

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Paul Schme » Fri, 25 Apr 1997 04:00:00


[snip]

Quote:>eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
>fixes yet, ie. anyone from the net can just download all your security
>files and crack passwords with a good chance.

This is just flat not true.  There <is> a fix for the RedButton
attack which has been discussed here briefly and in detail on the
NTBugTraq mailing list.

And ntcrack does nothing more than what crack does for unix.
<If> you can get ahold of the hashed passwords, you can run
ntcrack against them and you <might> crack <some> of them.

Saying "anyone from the net can just download all your security
files" is totally false.  Where did you get this idea?  Do you
know of <any> program which gives someone access to the SAM to
grab the obfuscated hashes for the entire network?  I think not.


Lab Manager, UT Dallas
http://www.utdallas.edu/~pauls/
Please note: Reply to: is set to foil auto ads.

"Your attitude determines your altitude"

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Bill Mora » Fri, 25 Apr 1997 04:00:00


--
Bill Moran . . .

Some fear what they do not understand . . .
I understand what they fear!

Quote:> eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
> fixes yet, ie. anyone from the net can just download all your security
> files and crack passwords with a good chance.

Holy horry stories Batman!! If you're worried about getting hacked, set
your failed login attempts to about 3 or 5 and rename your admin password
to something other than "Administrator". (Doesn't fix it, but makes it
harder)
Other than that, I have yet to see and OS that doesn't have a loophole
somewhere if the hacker is determined enough.
Quote:

> -- mingo

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Jim » Sat, 26 Apr 1997 04:00:00


 DNS Fix
 IIS Fix
RAS Fix
RPC Fix
Serial Fix
SFMSVR fix
TCP/IP fix

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Luke Brenn » Sat, 26 Apr 1997 04:00:00




Quote:>  DNS Fix
>  IIS Fix
> RAS Fix
> RPC Fix
> Serial Fix
> SFMSVR fix
> TCP/IP fix

  from Microsoft!!     www.microsoft.com

  check the NT FAQ  - http://www.savilltech.com/ntfaq.html
  for details.

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by David LeBla » Sat, 26 Apr 1997 04:00:00



>eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
>fixes yet, ie. anyone from the net can just download all your security
>files and crack passwords with a good chance.

This isn't true.  I have written an app which denies the redbutton
hack access to the registry, and it was available within 4 hours after
the release of redbutton.  You can also set the winreg key
permissions, and that will also shut it down.  Phil Brass wrote a way
to set the DACL on the ability to dump users.  My app is available at
http://www.iss.net.

You have to administrator to run pwdump in the first place.  Saying
anyone from the net can download your passwords is just completely
false.  

David LeBlanc           |Why would you want to have your desktop user,

                        |minicomputer-class computing environment?
                        |Scott McNealy

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by David LeBla » Sun, 27 Apr 1997 04:00:00



>Bill Moran . . .

>Some fear what they do not understand . . .
>I understand what they fear!
>> eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
>> fixes yet, ie. anyone from the net can just download all your security
>> files and crack passwords with a good chance.
>Holy horry stories Batman!! If you're worried about getting hacked, set
>your failed login attempts to about 3 or 5 and rename your admin password
>to something other than "Administrator". (Doesn't fix it, but makes it
>harder)
>Other than that, I have yet to see and OS that doesn't have a loophole
>somewhere if the hacker is determined enough.

From my POV, you're both missing a few things.  First let me explain
how redbutton works and how to stop it:

RedButton was intended to be a marketing tool for MWC.  It displays an
old, but little-known "feature" in NT which is used to enable
enumeration of users for cross-domain permissions settings.  It
establishes what is known as a null session, then proceeds to
enumerate the users, shares, and then attaches to the registry, where
it has the permissions of "everyone".  MWC would have liked you to go
to their site and buy their "Admin Assistant" tools for $95 to solve
this "problem".  One point I'll make before I explain how to stop
RedButton is that renaming administrator is COMPLETELY USELESS.  It is
trivial to figure out exactly which user is admin, even if it is named

passprop.exe from the NT Resource Kit to enable lockouts on
administrator (it won't lock it out from the console).  You can also
go set the "right to log on from the network" so that administrator
isn't included.  Either of these approaches are FAR more effective
than renaming it.

How to stop RedButton:

1) Go into HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\
SecurePipeServers.  Create a key named winreg.  Set the permissions on
that key to whoever you'd like to access the registry from the
network.  Do NOT include "everyone" in this list.  Reboot.

2) Go to http://www.iss.net and download everyone2user apply it as
follows:

everyone2user software
everyone2user system\currentcontrolset\services

Be warned that this utility will cause significant growth in the size
of the registry.  This is being looked into.  Also, be aware that this
tool has NOT been tested extensively, there is NO warranty, and PLEASE
backup your registry before beginning.  If you find anything not
working after applying it, enable auditing on the affected sections of
the registry, determine which keys are having the problem, and set the
permissions to correct the problem.

This tool just substitutes the users group for the everyone group in
the registry tree where you start it.

Either or both of these measures will shut down RedButton's ability to
read your registry.  This absolutely should be done until SP3 comes
out.  RedButton is a hack in that it does not clean up its
connections.  Once it has been run, you can then pop up Registry
Editor and WRITE to any key where "everyone" has write access.

If you'd like to check just where "everyone" can go, Frank Ramos'
DumpACL is a great little tool - look at http://www.somarsoft.com.

3) In order to stop user enumeration, Phil Brass has created a tool to
do this - I don't have an URL for it right now.  We'll also be able to
turn this off (along with share enumeration) after SP3 comes out.
I'll see about having Phil's tool available from ISS's page on Monday.

About NTCrack - See Russ Cooper's response, which is linked from
http://www.microsoft.com/security, or
http://ntbugtraq.rc.on.ca/index.html.  The point here is that you MUST
be administrator to run this tool.  Claiming that you can download the
"security files" is complete bullshit.  There will be some
enhancements delivered in SP3 which can be used to stop both pwdump
and NTCrack dead in their tracks, EVEN IF AN ADMIN ACCOUNT IS
BREACHED, or if the repair disk is stolen.

If you'd like to gather more information on these topics, the archives
of the ntsecurity mailing list are kept on ISS's web site
(http://www.iss.net), and ISS's FTP site.  You can also join the list

the body.  The ntsecurity list is unmoderated and has a fair bit of
noise, but much useful information.  There is also the NTBUGTRAQ list,
run by Russ Cooper, which is moderated and is much lower traffic.  

David LeBlanc           |Why would you want to have your desktop user,

                        |minicomputer-class computing environment?
                        |Scott McNealy

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Chri » Sun, 27 Apr 1997 04:00:00




Quote:

> eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
> fixes yet, ie. anyone from the net can just download all your security
> files and crack passwords with a good chance.

> -- mingo

NTCrack requires that you are logged in as the administrator to use it, and
even then, cant crack all the passwords. If my understanding is correct..,
ntcrack is merely a brute force hacker, using a dictonary of words...
 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Vincent Bake » Sun, 27 Apr 1997 04:00:00


I checked the reg and step one is all ready done (by default ???) so do I
need
to do step two as well??

How to stop RedButton:

1) Go into HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\
SecurePipeServers.  Create a key named winreg.  Set the permissions on
that key to whoever you'd like to access the registry from the
network.  Do NOT include "everyone" in this list.  Reboot.

2) Go to http://www.iss.net and download everyone2user apply it as
follows:

everyone2user software
everyone2user system\currentcontrolset\services

Be warned that this utility will cause significant growth in the size
of the registry.  This is being looked into.  Also, be aware that this
tool has NOT been tested extensively, there is NO warranty, and PLEASE
backup your registry before beginning.  If you find anything not
working after applying it, enable auditing on the affected sections of
the registry, determine which keys are having the problem, and set the
permissions to correct the problem.

 
 
 

HOT FIX for NT 4.0 .... What for????

Post by Luke Brenn » Mon, 28 Apr 1997 04:00:00






>> eg. for the infamous 'redbutton' tool, and for 'ntcrack' there are no
>> fixes yet, ie. anyone from the net can just download all your security
>> files and crack passwords with a good chance.

   there ARE fixes for REDBUTTON. Just alter a Registry setting...