| VID |
28006 |
| Severity |
20 |
| Port |
137,138,139 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The remote windows system is connected using a null session to IPC$. IPC$ is a share created on each Windows NT computer through which interprocess communication can take place. A null session (as opposed to a validated session) is used because browsing can occur without a valid trust relationship. The null session is analogous to an anonymous login, permitting the computer to obtain a browse list as the following without regard to resource permissions:
- User names - Groups - Trusted domains and workstations - All Shares (including the hidden ones)
The null session can be restricted to authenticated users by setting the RestrictAnonymous registry key. - User names - Groups - Trusted domains and workstations - All Shares (including the hidden ones)
The null session can be restricted to authenticated users by setting the RestrictAnonymous registry key.
* Platforms Affected: Microsoft Windows NT, 2000, XP
* References: http://www.pcmag.com/article2/0,4149,671696,00.asp http://www.brown.edu/Facilities/CIS/CIRT/help/netbiosnull.html http://www.iss.net/security_center/static/679.php |
| Recommendation |
To prevent the listing of the shares for being obtained via a null session, you should either have tight login restrictions, so that only trusted users can access your host, and/or you should filter incoming traffic to some ports (137/tcp|udp, 138/udp, 139/tcp). To restrict anonymous connections in Windows, follow these steps:
For Windows NT: 1. Open Registry Editor. From the Windows NT Start menu, select Run, type regedt32. 2. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA. 3. Double Click "RestrictAnonymous" Key and In the Data field, type 1. 4. Close Registry Editor, and Reboot the system to apply the changes.
For Windows 2000: 1. Open Registry Editor. From the Windows 2000 Start menu, select Run, type regedt32. 2. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA. 3. Double Click "RestrictAnonymous" Key and In the Data field, type 2. 4. Close Registry Editor, and Reboot the system to apply the changes.
For Windows XP, 7, 8, 10 : 1. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa by using regedit or other registry editing program. 2. Set RestrictAnonymous to 1 to limit access to share information 3. Set RestrictAnonymousSAM to 1 to prevent enumeration of SAM(Security Accounts Manager) 4. set EveryoneIncludesAnonymous to 0, which will keep null-session users from having any rights.
-- AND --
1. Go to Administrative Tools -> Local Security Settings -> Local Policies -> Security Options. 2. Make sure the following two policies are enabled: - Network Access: Do not allow anonymous enumeration of SAM accounts a Enabled - Network Access: Do not allow anonymous enumeration of SAM accounts and shares a Enabled 3. Enable two policies if it's not enabled.
* Note : This setting still allows the establishment of a null session, but nothing will leak for enumeration of accounts and shares. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|