Korean
<< Back
VID 28320
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A user with the Take Ownership of Files or Other Objects privilege is detected. Take ownership of files or objects allows a user to become the listed owner of files and other objects. This right is normally given only to Administrators. A normal user with this privilege could change ownership permissions to access sensitive files.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://support.microsoft.com/default.aspx?scid=kb;[LN];170834
http://support.microsoft.com/default.aspx?scid=kb;[LN];186374
http://hq.mcafeeasap.com/vulnerabilities/vuln_data/23000.asp
http://www.statonline.com/technologies/sec_articles/rights.asp

* Platforms Affected:
Windows Any version
Recommendation Check user rights for the Take Ownership of Files or Other Objects, and remove any names disallowed by your security policy.

To audit and revoke this privilege:

For Windows NT:

1. Open User Manager (From the Windows NT Start menu, select Programs, Administrative Tools (Common), and User Manager).
2. From the Policies menu, select User Rights to display the User Rights Policy dialog box.
3. From the Right list, select Take Ownership of Files or Other Objects.
4. Verify this right is set in accordance with your administration policy.
5. To remove a user, select the user and click Remove.

For a Windows 2000 domain:

1. Start Microsoft Management Console (mmc). From the Windows Start menu, select Run, type mmc, and click OK.
2. Add Group Policy Snap-in.
3. Browse Group Policy Objects.
4. Select the Domain Policy of interest.
5. Traverse the following path:
Computer Configuration, Windows Settings, Security Settings, Local Policies, User Rights Assignment and Take Ownership of Files or Other Objects.
6. Set the user right to desired setting according to your administration policy.

For a stand-alone Windows 2000 computer:

1. On the affected computer, start gpedit.msc. From the Windows Start menu, select Run, type gpedit.msc, and click OK. The focus is local computer by default.
2. Traverse the following path:
Computer Configuration, Windows Settings, Security Settings, Local Policies, User Rights Assignment and Take Ownership of Files or Other Objects.
3. Set the user right to desired setting according to your administration policy.

For Windows XP, 2003, 7, 2008, 8, 2012, 10, 2016, 2019 computer:

1. On the affected computer, start gpedit.msc. From the Windows Start menu, select Run, type gpedit.msc, and click OK. The focus is local computer by default.
2. Traverse the following path:
Computer Configuration, Windows Settings, Security Settings, Local Policies, User Rights Assignment and Take Ownership of Files or Other Objects.
3. Set the user right to desired setting according to your administration policy.
Related URL CVE-1999-0534 (CVE)
Related URL (SecurityFocus)
Related URL 243 (ISS)