Remote Registry and Annonymous User Issue A new program was released this weekend that allows ANYONE with remote access to an NT server (using ports 137, 138, and 139) to connect to that machine, read the registry, and create a new share accessible to the Everyone group. This is a SERIOUS problem that should be guarded against at all costs. A quick test of this new RedButton program shows that it does in fact connect to a remote NT system.
Administrators should seriously consider blocking access to ports 137, 138, and 139 on any machines exposed to the Internet. You can also stop the Server service to protect yourself, although doing so eliminates the ability for that server to share resources.
Another consideration is to edit the Registry as follows:
1. Open
HKEY_LOCAL_MACHINE/CurrentControlSet/Control/SecurePipeServers
RedButton was released by MWC, security consultants, who are maintaining a Web page about the new RedButton software at http://www.ntsecurity.com/redbutton. NOTE: This Web address is ntsecurity.com - not associated with NTSD or ntsecurity.net. We are not responsible for content at thier site.
RedButton will:
Download a test version of RebButton from MWC
Microsoft released a HOTFIX for the RedButton problems on May 3, 1997. Be CERTAIN to read the Knowledge Base articles and README files in the distribution directory - this software hotfix installs itself without warning so be careful to understand it completely before proceeding.
|
RedButton Remote Registry
0 comments
Hide comments