The information in this article applies to:
SYMPTOMSThe following symptoms may occur:
CAUSEThis behavior occurs in Windows NT 4.0 because the registry key listed below grants the SetValue permission to the Everyone group by default, so that any user (even guests) can edit the information in the ProfileList registry key and its subkeys: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileListEditing these keys can be performed locally or remotely, and setting permissions in the Access Control List (ACL) on the Winreg key (HKEY_LOCAL_MACHINE\System) does not limit remote access because the path to the CurrentVersion key is an allowed path and can be edited regardless of the permissions assigned to the Winreg key. RESOLUTIONTo resolve this problem, obtain the latest service pack for Windows NT 4.0. For additional information, please see the following article in the
Microsoft Knowledge Base: Q152734 How to Obtain the Latest Windows NT 4.0 Service PackWhen you apply Windows NT 4.0 Service Pack 6 (SP6), the default permission on the Everyone group is set to read access only. Also, the process created by Winlogon.exe creates the user's Security Identifier (SID) subkey in the System account, instead of under the CurrentVersion key, and then writes the necessary values to the ProfileList key. STATUSMicrosoft has confirmed this to be a problem in the Microsoft products listed at the beginning of this article. This problem was first corrected in Windows NT 4.0 Service Pack 6. MORE INFORMATIONFor more information about making your Windows NT 4.0 installation secure, obtain the "Securing Windows NT Installation" white paper at the following Microsoft Web site: http://www.microsoft.com/NTServer/security/exec/overview/Secure_NTInstall.asp Additional query words:
Keywords : kbenv ntsecurity ntsp kbbug4.00 kbfix4.00 NT4SP6Fix |
Last Reviewed: October 28, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |