[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1982309297.20060523190111@SECURITY.NNOV.RU>
Date: Tue, 23 May 2006 19:01:11 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: "Memet Anwar" <mmta.gm@...il.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: Circumventing quarantine control in Windows 2003 and ISA 2004
Dear Memet Anwar,
MA> The problem is due to how the requirements are
MA> validated, it is trivial for users to trick RRAS/ISA into believing that the
MA> client's system are always aligned with the requirements, regardless the
MA> actual condition.
If you have local administrator level access to the box you can bypass
any "internal" checks for this box. You can bypass any Domain policies.
You can do everything.
Quarantine Control was not designed to protect against attack of this
kind. It's a tool to check policy matching, not to protect
http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/vpnroamingquarantine.mspx
-=-=-=-=- Quote begin -=-=-=-=-
Although Quarantine Control does not protect against attackers,
computer configurations for authorized users can be verified and, if
necessary, corrected before they can access the network.
-=-=-=-=-= Quote end =-=-=-=-=-
--
~/ZARAZA
http://www.security.nnov.ru/
Powered by blists - more mailing lists