From secnotif@MICROSOFT.COM Fri Feb 4 18:05:05 2000 From: Microsoft Product Security Resent-From: mea culpa To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Resent-To: jericho@attrition.org Date: Fri, 4 Feb 2000 11:11:38 -0800 Subject: Microsoft Security Bulletin (MS00-004) The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** Microsoft Security Bulletin (MS00-004) -------------------------------------- Patch Available for "RDISK Registry Enumeration File" Vulnerability Originally Posted: January 21, 2000 Revised: February 3, 2000 Summary ======= On January 21, 2000, Microsoft released the original version of this bulletin, discussing a security vulnerability in a Microsoft(r) Windows NT(r) 4.0 administrative utility. The original version of the bulletin discussed the vulnerability within the context of Windows NT 4.0 Server, Terminal Server Edition. However, we have since learned of scenarios under which the vulnerability could also affect Windows NT 4.0 servers and workstations, and have revised the bulletin accordingly. The utility creates a temporary file during execution that can contain security-sensitive information, but does not appropriately restrict access to it. Under certain conditions, it could be possible for a malicious user to read the file as it was being created Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/technet/security/bulletin/fq00-004.asp. Issue ===== The RDISK utility is used to create an Emergency Repair Disk (ERD) in order to record machine state information as a contingency against system failure. During execution, RDISK creates a temporary file containing an enumeration of the registry. The ACLs on the file allow global read permission, and as a result, a malicious user who knew that the administrator was running RDISK could open the file and read the registry enumeration information as it was being created. RDISK erases the file upon successful completion, so under normal conditions there would be no lasting vulnerability. By default, the file is not shared and therefore could not be read by other network users. Affected Software Versions ========================== - Microsoft Windows NT 4.0 Workstation - Microsoft Windows NT 4.0 Server - Microsoft Windows NT 4.0, Enterprise Edition - Microsoft Windows NT 4.0, Terminal Server Edition Patch Availability ================== Windows NT 4.0 Workstation; Windows NT 4.0 Server; Windows NT 4.0 Server, Enterprise Edition: - Intel: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17745 - Alpha: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17747 Windows NT 4.0 Server, Terminal Server Edition: - http://www.microsoft.com/Downloads/Release.asp?ReleaseID=17384 NOTE: Additional security patches are available at the Microsoft Download Center More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-004, http://www.microsoft.com/technet/security/bulletin/fq00-004.asp. - Microsoft Knowledge Base (KB) article Q249108, Registry Data Is Viewable By All Users After Rdisk Repair Update, http://www.microsoft.com/technet/support/kb.asp?ID=249108. - Microsoft Knowledge Base (KB) article Q156328, Description of Windows NT Emergency Repair Disk, http://www.microsoft.com/technet/support/kb.asp?ID=156328 - Microsoft Security web site, http://www.microsoft.com/technet/security/default.asp. Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Acknowledgments =============== Microsoft thanks Arne Vidstrom (http://ntsecurity.nu) for reporting this issue to us and working with us to protect customers. Revisions ========= - January 21, 2000: Bulletin Created. - February 3, 2000: Bulletin revised to address other affected versions ---------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last updated Thursday, February 3, 2000 (c) 2000 Microsoft Corporation. All rights reserved. Terms of use ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM The subject line and message body are not used in processing the request, and can be anything you like. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/security/services/bulletin.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.