![]() |
Microsoft Security Bulletin MS02-003Exchange 2000 System Attendant Incorrectly Sets Remote Registry PermissionsOriginally posted: February 07, 2002 SummaryWho should read this bulletin: Impact of vulnerability: Maximum Severity Rating: Recommendation: Affected Software:
General Information
Technical description: The Microsoft Exchange System Attendant is one of the core services in Microsoft Exchange. It performs a variety of functions related to the on-going maintenance of the Exchange system. To allow remote administration of an Exchange Server using the Exchange System Manager Microsoft Management Console (MMC) snap in, the System Attendant makes changes to the permissions on the Windows Registry to allow Exchange Administrators to remotely update configuration settings stored in the Registry. There is a flaw in how the System Attendant makes these Registry configuration changes. This flaw could allow an unprivileged user to remotely access configuration information on the server. Specifically, this flaw inappropriately gives the "Everyone" group privileges to the WinReg key. This key controls the ability of users and groups to remotely connect to the Registry. By default, only Administrators are given the ability to remotely connect to the Registry, by granting permissions on this key. The flaw does not grant any abilities beyond the ability to connect remotely. However, an attacker's ability to make changes to the Registry once they have successfully connected would be dictated by the permissions on the specific keys within the Registry itself. Thus, while this vulnerability does not itself give an attacker the ability to change Registry settings, it could be used in conjunction with inappropriately permissive registry settings to gain access to, and make changes to a systems Registry. Mitigating factors:
Severity Rating:
The above assessment is based on the types of systems affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them. For Internet exposed systems, the best practices of blocking tcp ports 139 and 445 at the firewall prevents remote access to the registry. While there is a potential for allowing data to be compromised, there are significant mitigating factors. Vulnerability identifier: CAN-2002-0049 Tested Versions: Microsoft tested Exchange 5.5 and Exchange 2000 to assess whether they are affected by these vulnerabilities. Previous versions are no longer supported, and may or may not be affected by these vulnerabilities.
What's the scope of the vulnerability?
What causes the vulnerability? What is the Exchange 2000 System Attendant? What is the Registry? How does the Registry secure the information it stores? What is the WinReg value? Does the WinReg value control the ability to add, change or delete information in the Registry? What's wrong with how the Exchange 2000 System Attendant handles the WinReg Key? How might an attacker exploit this vulnerability? Could an attacker exploit this vulnerability on the Internet? What would this vulnerability enable an attacker to do? What does the patch do? Does the patch remove the Everyone Group from the WinReg value? Does the patch make any other changes to the Registry permissions? So, does this mean the patch restores the WinReg value's permissions to the defaults?
Download locations for this patch
Installation platforms: This patch can be installed on systems running Microsoft Exchange 2000 SP2. Inclusion in future service packs: The fix for this issue will be included in Microsoft Exchange 2000 SP3. Reboot needed: Yes Superseded patches: None. Verifying patch installation:
Caveats: None Localization: Localized versions of this patch are under development. When completed, they will be available at the locations discussed in "Obtaining other security patches". Obtaining other security patches: Patches for other security issues are available from the following locations:
Other information:Acknowledgments Microsoft thanks Eitan Caspi for reporting this issue to us and working with us to protect customers. Support:
Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products. Disclaimer: The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Revisions:
|
|