Korean
<< Back
VID 28620
Severity 20
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Application Event Log is set to be accessible by a user who has logged on the system with the guest privilege or null session.
This enables the malicious attacker who has successfully logged on a computer with guest privileges or null session to read the important information about the system from the Application Event Log. The attacker could then use this information to implement additional exploits.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/Security/topics/hardsys/tcg/tcgch06.mspx
http://msdn.microsoft.com/library/en-us/dnsecure/html/msdn_secinst.asp
http://is-it-true.org/nt/atips/atips28.shtml

* Platforms Affected:
Microsoft Windows Any version
Recommendation Remove network access rights for the Guest account.

1. Open Registry Editor. (From the Windows system Start menu, select Run, type regedit or regedt32, and click OK.)
2. Go to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EventLog\Application registry key.
3. Set the value for "RestrictGuestAccess" entry to "1".
4. To apply the change, restart the system.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)