News

Microsoft Warns of NT 4.0 Bug

Microsoft Corp. has released a tool that installs tighter permissions on a Windows NT 4.0 registry key. The default permissions could allow a malicious user who can interactively log onto an NT 4.0 machine to compromise the cryptographic keys of other users who subsequently log onto the same machine.

The vulnerability involves a registry key used by the CryptoAPI Base CSPs to specify the driver DLL for a hardware accelerator. By design, such a DLL would have access to users' public and private keys. Although only administrators should have permission to add such a DLL, the permissions on the key actually would allow any user who could interactively log onto the machine to do so. By writing a false DLL and installing it, a malicious user could compromise the keys of other users who subsequently used the machine.

The machines primarily at risk would be workstations and terminal servers. Microsoft Windows NT 4.0 Workstation, NT 4.0 Server, NT 4.0 Server, Enterprise Edition, and NT 4.0 Server, Terminal Server Edition are all affected. Windows 2000 is not affected.

A patch is available for Intel x86 machines at http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20330 and for Compaq Alpha machines at http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20331. - Isaac Slepner

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.