lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 11 Mar 2007 00:50:07 +0100
From: KJKHyperion <hackbunny@...tpj.org>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Microsoft Windows Vista/2003/XP/2000
 file	management security issues

3APA3A wrote:

>  And now is most exciting: Users have permission to create files in this
>  directory, that is pre-open attack is possible.

holy %&$@£%!# you're right:

D:\WINDOWS\security\templates>more "setup security.inf" | findstr /r /i 
"\<temp\>"
"d:\windows\temp", 2, 
"D:P(A;CI;0x100026;;;BU)(A;CIOI;GRGWGXSD;;;PU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)
(A;CIOI;GA;;;CO)"

Where "(A;CI;0x100026;;;BU)" =
    A = access allowed
    CI = container and items (subfolders and files), this folder only
    0x100026 = SYNCHRONIZE, traverse, create files, create subfolders
    BU = BUILTIN\Users

/revokes
/plans to eventually make a custom security policy .inf

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ