Microsoft Windows 2000 and XP SMB signing group policy modification

win-smb-policy-modification (10843) The risk level is classified as MediumMedium Risk

Description:

A vulnerability the Server Message Block (SMB) signing function in Microsoft Windows 2000 and Windows XP could allow a remote attacker to disable SMB signing and modify group policy settings. SMB signing is an option available with Windows 2000 and Windows XP that is used to digitally sign all packets that are transmitted using the SMB protocol. If a remote attacker from within the local network is able to intercept and modify data as it is being exchanged between a client and server, the attacker could disable SMB signing and possibly change the group policy settings. An attacker could use this vulnerability to modify file and folder permissions, cause programs to be executed at system startup, and possibly perform other malicious actions on the vulnerable client.


Consequences:

Gain Privileges

Remedy:

Apply the appropriate patch for your system, as listed in the latest Microsoft Security Bulletin. See References.

— OR —

Use Microsoft Automatic Update if it is supported by your operating system. The original bulletin issued by Microsoft has been superceded.

References:

Platforms Affected:

  • Microsoft Windows 2000
  • Microsoft Windows XP

Reported:

Dec 11, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page