| VID |
26014 |
| Severity |
30 |
| Port |
139 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The hotfix (Q274372) for the "Domain Account Lockout" problem has not been applied. Windows 2000 hosts could allow a local attacker to bypass the domain account lockout policy on a Windows NT domain. Due to a vulnerability in the Windows 2000 implementaion of NTLM authentication, if the user's login credentials are cached, Windows 2000 fails to respect the domain's account lockout policy while processing attempts to log in to the user's account. A remote attacker can use a brute force attack to log in to the local computer with the cached credentials, but would not be able to access any domain resources.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* Platforms Affected: Microsoft Windows 2000 |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS00-089. (http://www.microsoft.com/technet/security/bulletin/ms00-089.asp) |
| Related URL |
CVE-2000-1217 (CVE) |
| Related URL |
1973 (SecurityFocus) |
| Related URL |
5585 (ISS) |
|