Bugtraq mailing list archives

Vulnerability: Windows2000Server running Terminalservices


From: "Tom.Unger () gmx de" <tom.unger () gmx de>
Date: Tue, 9 Apr 2002 00:16:04 +0200

Hi,

while setting up and workung with a windows 2000 server running
terminalservices I think I found a
securityhole/exploit:
Windows 2000 grouppolicies (gpo) are not applied to users if the current
count of connections to the gpo hosting
server exceed the number of installed userlicenses

This can be easily exploited on a terminalservices enabled server which I
will decribe "en detail" in this mail.

This behaviour can be reproduced on any standard installation of windows
2000 server. To be sure that
this is not caused by any fancy setting applied by myself, I repeated the
installationprocedure of the system
three times even with different languageversions of the serversoftware only
to find always the same issue.

I thought this is interesting to you and other administrators beeing
responsible for terminalservers.

general description:
=============
Grouppolicies are used to deploy desktop/systemsettings to a defined group
of users or computers and are a powerful instrument
to secure a system.With the aid of grouppolicies it is for example possible
to lock down userdesktops/systems by denying the
ability to run certain  programs like regedit.exe or cmd.exe and so on. This
is very useful for servers like terminalservers running
in a hostile environment (e.g terminal-servers connected to the internet)
because a cracked user-password granting access to a
weakly restricted userprofile is more dangerous than in an trusted network
inside a company.

Settings defined in grouppolicies are applied to the userprofile during
logon if the user has the right to access the grouppolicyobject.
The access is controlled by the acl (access control list) of the
grouppolicyobject. The user must have the right to read and apply
a gpo in order to successfully apply the grouppolicy to its profile.
Microsoft claims that a successfully applied grouppolicy is saved
in the userprofile when logging off (in reality this seems not to be true in
any case).

The grouppolicyobject are stored inside some directories on the share
"sysvol" hosted by a logon-server.
As any other (smb)-share, "sysvol" can suffer from connectionlimits to it,
introduced by limited userlicenses or manual settings.
For example a windows 2000 server with 5 users (out of the box) and default
licensing set to "per server" is limited to 5
concurrent connections to sysvol or any other share provided by this server.
This legal feature helps the admin to keep track
of the actual needed licensecount and even more than that: it can deny
access to a gpo if the number of allowed concurrent
connections are exceeded with a dangerous result.

Later in this mail, I will describe an exploit  in which a user can avoid
been locked down by a secure gpo.

First I will describe in which systemenvironment and szenario I found an
exploit is possible.

Szenario:
=======
A Win2k-Server(ADC) provides terminalservices to only one (1!)  remoteuser.
The server is connected to the internet.
Due to securityconsiderations the administrator of this server develops a
really tight grouppolicy so that the terminalserver-user
can only run one program "mywork.exe" he needs for his daily work.
Everything else is locked to the remoteuser.

Here are the details of the serversetup:

* take a win2k-server english/german (both tested) and install it on machine
connected to a network
* install Win2k-servicepack 2 and the security-rollup-package for Win2k
* promote the server to an active-direcory-controller
* install terminal-server in application mode with 90-day trial (no
ts-licensing server)
* the license-manager-program shows 5 Users "per server" which is really
enough in this scenario with one remoteuser !
* create a user TS-User in the AD
* the user TS-User is member of the security-group "Domain-User"
* the user has the right to log on locally and has the right to log on via
terminalserver in order to use the terminalserver
* The admin creates another grouppolicy called TS-GPO beside the
defaultpolicy
* The admin sets up the TS-GPO really tight so that the terminalserver-user
can run only mywork.exe nothing else.
(for quick testing what I am telling you simply set the gpo no to show "Run"
in the startmenu)

* the admin sets the ACL of TS-GPO so that the user TS-User can read and
apply it

The result is: The user TS-User logs on via terminal-server-client (TSC) to
the server. The gpo is applied and the user
TS-User can do nothing more than starting "mywork.exe" and logging off. This
works fine ...the user logs on, logs off, logs on
always seeing a locked down desktop ... till the he finds a way to avoid the
tight gpo beeing applied to his profile.

Exploit:
======
Here is a step by step description how to provoke the failure of the gpo by
simply exceeding the userlicenses
(The user TS-User logged on and off several times before. I say this here to
show that the gpo could have been
saved to the profile of the user as stated by Microsoft.)

1. The user TS-User connects to the terminalserver via terminalserverclient
once.(the admin recognizes: net session shows
one connection. perhaps it shows a second connection by a user called
server$ or so)

2. the user TS-User opens a second connenction to the terminalserver via
terminalserverclient ("net session" now shows
one more session )

3. the user TS-User opens some more connections to the terminalserver via
terminalserverclient until "net session" shows 5
connections

4. the user TS-User opens another connections to the terminalserver via
terminalserverclient. This time the sixth session
exceeds the userlimit. The system grants the user TS-User to log on. The
system denies access to the gpo hosted somewhere
on the share "sysvol". The gpo is N O T applied. The result is the user
TS-User sees an totally open desktop.He can do only
things according to his userrights due to membership of domain-user. But he
can do more than intended by the admin.

If you try out what I am telling here, you will notice that even if the user
logs off once the gpo are applied successfully, the gpo
is not saved in the userprofile. If the gpo would have been saved to the
profile as claimed by Microsoft, the desktop would
have beed locked down even if the system denies access to the gpo.

As you will agree with me, neither the admin nor the TS-User are violating
any licensing issues. There is one user exceeding the 5-user limit.
The problem is the stupidity of the system by simply considering userlimits
more important than granting access to grouppolicies.

This is also no terminal-server issue, because the eventlog shows (if
auditing is enabled correctly) an event which describes
an access-denial  to sysvol\... where the gpo resides.


Workarround:
=============
* disabling the service "license logging". This keeps the system from
contolling connectionlimits
* change licensing from "per server" to "per seat" if this is possible with
licensing

Microsoft has been informed by mail on march 23, 2002.




Current thread: