lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20051118141813.D9F5415F516@mail.ngssoftware.com>
Date: Fri, 18 Nov 2005 14:32:08 -0000
From: "David Litchfield" <davidl@...software.com>
To: <full-disclosure@...ts.grok.org.uk>, <bugtraq@...urityfocus.com>
Subject: Snagging Security Tokens to Elevate Privileges


I've just put up a Database Security Brief; the first of many to come.

http://www.databasesecurity.com/dbsec-briefs.htm

It's called a brief because there's enough meat to make it interesting but
not enough to make it a paper ;)

This brief, Snagging Security Tokens to Elevate Privileges, details how a
database server running as a low privileged user on Windows can still
provide an attacker with the ability to gain elevated privileges on the
network and suggests a change it security policy to mitigate the risk. As a
side note, this affects all network servers that offer OS based
authentication - not just database servers.

Cheers,
David



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ