Exploit Microsoft Systems Management Server 2.0 - Default Permissions

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19728
Проверка EDB
  1. Пройдено
Автор
FRANK MONROE
Тип уязвимости
LOCAL
Платформа
WINDOWS
CVE
cve-2000-0100
Дата публикации
1999-12-29
Microsoft Systems Management Server 2.0 - Default Permissions
Код:
source: https://www.securityfocus.com/bid/945/info

The default permissions applied to the directory containing the SMS Remote Control executable allow any user to replace the executable with any other executable. The new executable will run with System privileges after the next reboot.

Replace %SMS_LOCAL_DIR%\MS\SMS\CLICOMP\REMCTRL\WUSER32.EXE with a copy of wuser32.exe. After the next reboot, User Manager will run at startup with System privileges, allowing the logged-in user to add their account to arbitrary groups, including Administrators.
 
Источник
www.exploit-db.com

Похожие темы