Korean
<< Back
VID 28060
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The 'Microsoft Transaction Server' registry key is writable by users who are not in the Administrators group.
Microsoft Transaction Server (MTS) is the mechanism used by Microsoft Windows NT to handle transactions or MTS packages which are series of software modules that form a transaction. The lenient permissions on the Microsoft Transaction Server Package Administration key, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Transaction Server\Packages, could allow an attacker to add themselves as an MTS manager. A local attacker can use this vulnerability to delete, add, or execute MTS packages on a system under the security context of their account. This vulnerability could be exploited remotely if the Winreg key was enabled to allow remote access to the registry (Winreg is disabled by default in Windows NT Server and enabled by default in Windows NT Workstation).
MTS is not installed by default on Windows NT 4.0.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/MS00-095.asp
http://www.ciac.org/ciac/bulletins/l-026.shtml

* Platforms Affected:
Windows NT Any version
Recommendation Apply the patch for your system, as listed in Microsoft Security Bulletin MS00-095 at http://www.microsoft.com/technet/security/bulletin/MS00-095.asp

-- OR --

Remove write access to the 'Microsoft Transaction Server' registry key from users who are not in the Administrators group. This requires a modification in the registry as the following steps:

1. Open Registry Editor. From the Windows NT Start menu, select Run, type regedt32, and click OK.
2. Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Transaction Server\Packages.
3. From the Security menu, select Permissions to display the Registry Key Permissions dialog box.
4. Remove or change any permissions such as Everyone - Full Control. And review any names with Full Control permissions and determine if the permission is appropriate. Originally, This registry key is set as the following permissions:
- Administrators group : Full Control
- SYSTEM : Full Control
- Everyone : Read
Related URL CVE-2001-0047 (CVE)
Related URL 2065 (SecurityFocus)
Related URL 5673 (ISS)