The information in this article applies to:
SYMPTOMSOn a computer that is running Windows NT 4.0, it is possible for a malicious user to use a program that makes a specific local procedure call (LPC) to impersonate any other user who has local logon privileges and run any program, including programs that can run in the LocalSystem context. If the domain administrator's credentials are present on the computer, this could result in compromised security for the domain. RESOLUTIONThe following files are available for download from the Microsoft
Download Center. Click the file names below to download the files: Q247869i.exe for Intel-based computers Q247869a.exe for Alpha-based computersFor more information about how to download files from the Microsoft Download Center, please visit the Download Center at the following Web address http://www.microsoft.com/downloads/search.aspand then click How to use the Microsoft Download Center. The English-language version of this fix should have the following file attributes or later:
STATUSMicrosoft has confirmed this to be a problem in Windows NT 4.0. MORE INFORMATION
For additional information about local procedure calls, see pages 95 and 119 of the Microsoft Windows NT Workstation 4.0 Resource Kit. http://www.microsoft.com/security/bulletins/ms00-003faq.aspFor additional security-related information about Microsoft products, please visit the following Microsoft Web site: http://www.microsoft.com/security/ Additional query words: NtImpersonateClientOfPort LocalSystem
Keywords : ntdomain ntsecurity ntsp kbbug4.00 kbfix4.00 |
Last Reviewed: January 14, 2000 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |