The information in this article applies to:
SYMPTOMSA utility, Sechole.exe, is being circulated on the Internet that performs a very sophisticated set of steps that allows a non-administrative user to gain debug-level access on a system process. Using this utility, the non- administrative user is able to run some code in the system security context and thereby grant himself or herself local administrative privileges on the system. CAUSESechole.exe locates the memory address of a particular API function (OpenProcess) and modifies the instructions at that address in a running image of the exploit program on the local system. Sechole.exe requests debug rights that gives it elevated privileges. The request is successful because the access check for this right is expected to be done in the API that was successfully modified by the exploit program. Sechole.exe can now add the user who invoked Sechole.exe to the local Administrators group. RESOLUTIONWindows NT 4.0To resolve this problem, obtain the latest service pack for Windows NT version 4.0. For more information, please see the following article in the Microsoft Knowledge Base.ARTICLE-ID: Q152734 While this hotfix is included with Service Pack 4, it is also available individually. This hotfix ensures that the access check to grant any rights is done by the server and not the client. This fix has been posted as Privfixi.exe (x86) and Privfixa.exe (Alpha). For your convenience, the English version of this post-SP3 hotfix has been posted to the following Internet location. However, Microsoft recommends that you install Windows NT 4.0 Service Pack 4 to correct this problem. ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP3/priv-fix/NOTE: If you contact Microsoft to obtain this fix, a fee may be charged. This fee is refundable if it is determined that you only require the fix you requested. However, this fee is non-refundable if you request additional technical support, if your no-charge technical support period has expired, or if you are not eligible for standard no-charge technical support. For more information about eligibility for no-charge technical support, see the following article in the Microsoft Knowledge Base: ARTICLE-ID: Q154871 Windows NT Server version 4.0, Terminal Server EditionTo resolve this problem, obtain the latest service pack for Windows NT Server 4.0, Terminal Server Edition. For additional information, please see the following article in the Microsoft Knowledge Base:Q152734 How to Obtain the Latest Windows NT 4.0 Service Pack This hotfix ensures that the access check to grant any rights is done by the server and not the client. This fix has been posted to the following Internet location as Privfixi.exe (x86) and Privfixa.exe (Alpha): ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40TSE/hotfixes-postSP3/priv-fix/ Windows NT 3.51Microsoft has confirmed this problem could result in some degree of security vulnerability in Windows NT version 3.51. A fully supported fix is now available, but it has not been fully regression tested and should only be applied to systems determined to be at risk of attack. Please evaluate your system's physical accessibility, network and Internet connectivity, and other factors to determine the degree of risk to your system. If your system is sufficiently at risk, Microsoft recommends you download the fix as described below and apply this fix.For a complete list of Microsoft Technical Support phone numbers and information on support costs, please go to the following address on the World Wide Web: http://support.microsoft.com/support/supportnet/default.aspThis fix should have the following file attributes:
This hotfix ensures that the access check to grant any rights is done by the server and not the client. This fix has been posted to the following Internet location as Privfixi.exe (x86) and Privfixa.exe (Alpha): ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT351/hotfixes-postSP5/priv-fix/NOTE: If you contact Microsoft to obtain this fix, a fee may be charged. This fee is refundable if it is determined that you only require the fix you requested. However, this fee is non-refundable if you request additional technical support, if your no-charge technical support period has expired, or if you are not eligible for standard no-charge technical support. For more information about eligibility for no-charge technical support, see the following article in the Microsoft Knowledge Base: ARTICLE-ID: Q154871 MORE INFORMATION
This exploit can potentially allow a non-administrative user to gain local
administrative access to the system and thereby elevate his or her
privileges on the system. To perform this attack, the user has to have a
valid local account on the system and has to have physical access to the
computer to log on locally to the system.
http://www.microsoft.com/security/bulletins/ms98-009.aspFor additional security-related information about Microsoft products, please go to: http://www.microsoft.com/security/ STATUSWindows NT 4.0 and Windows NT Server version 4.0, Terminal Server EditionMicrosoft has confirmed this problem could result in some degree of security vulnerability in Windows NT version 4.0 and Windows NT Server version 4.0, Terminal Server Edition. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.Windows NT 3.51Microsoft has confirmed this problem could result in some degree of security vulnerability in Windows NT version 3.51.Additional query words: Windows NT Privilege Elevation attack getadmin tse wts
Keywords : NT4SP4Fix kbbug4.00 kbfix4.00.sp4 |
Last Reviewed: November 9, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |