SecHole Lets Non-administrative Users Gain Debug Level Access to a System ProcessID: Q190288
|
A utility, Sechole.exe, is being circulated on the Internet that performs a very sophisticated set of steps that allows a non-administrative user to gain debug-level access on a system process. Using this utility, the non- administrative user is able to run some code in the system security context and thereby grant himself or herself local administrative privileges on the system.
Sechole.exe locates the memory address of a particular API function (OpenProcess) and modifies the instructions at that address in a running image of the exploit program on the local system. Sechole.exe requests debug rights that gives it elevated privileges. The request is successful because the access check for this right is expected to be done in the API that was successfully modified by the exploit program. Sechole.exe can now add the user who invoked Sechole.exe to the local Administrators group.
ARTICLE-ID: Q152734
TITLE : How To Obtain the Latest Windows NT 4.0 Service Pack
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP3/priv-fix/NOTE: If you contact Microsoft to obtain this fix, a fee may be charged. This fee is refundable if it is determined that you only require the fix you requested. However, this fee is non-refundable if you request additional technical support, if your no-charge technical support period has expired, or if you are not eligible for standard no-charge technical support. For more information about eligibility for no-charge technical support, see the following article in the Microsoft Knowledge Base:
ARTICLE-ID: Q154871
TITLE: Determining If Your Product Is Eligible for No-Charge Technical Support
Q152734 How to Obtain the Latest Windows NT 4.0 Service Pack
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40TSE/hotfixes-postSP3/priv-fix/
http://support.microsoft.com/support/supportnet/default.aspThis fix should have the following file attributes:
Date | Time | Size | File Name | Platform |
---|---|---|---|---|
07/31/98 | 02:47p | 31,184 | Csrsrv.dll | x86 |
07/31/98 | 02:48p | 4,400 | Csrss.exe | x86 |
07/31/98 | 05:47p | 48,400 | Csrsrv.dll | Alpha |
07/31/98 | 05:48p | 5,904 | Csrss.exe | Alpha |
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT351/hotfixes-postSP5/priv-fix/NOTE: If you contact Microsoft to obtain this fix, a fee may be charged. This fee is refundable if it is determined that you only require the fix you requested. However, this fee is non-refundable if you request additional technical support, if your no-charge technical support period has expired, or if you are not eligible for standard no-charge technical support. For more information about eligibility for no-charge technical support, see the following article in the Microsoft Knowledge Base:
ARTICLE-ID: Q154871
TITLE: Determining If Your Product Is Eligible for No-Charge Technical Support
This exploit can potentially allow a non-administrative user to gain local
administrative access to the system and thereby elevate his or her
privileges on the system. To perform this attack, the user has to have a
valid local account on the system and has to have physical access to the
computer to log on locally to the system.
Sensitive systems, such as the Windows NT domain controllers where non-
administrative users do not have any local log on rights by default, are
not susceptible to this threat. The attack cannot be used over the network
to get domain administrative privileges remotely.
For more information, please see the following Microsoft Security Bulletin
at:
http://www.microsoft.com/security/bulletins/ms98-009.aspFor additional security-related information about Microsoft products, please go to:
http://www.microsoft.com/security/
Additional query words: Windows NT Privilege Elevation attack getadmin tse wts
Keywords : NT4SP4Fix kbbug4.00 kbfix4.00.sp4
Version : WinNT:4.0
Platform : winnt
Issue type : kbbug
Last Reviewed: April 10, 1999