Full Disclosure mailing list archives

Microsoft Windows Active Directory Logon Hours User Enumeration Weakness


From: "Sumit Siddharth" <sid () notsosecure com>
Date: Thu, 31 May 2007 16:11:22 +0100

Windows Server 2003 can be configured
<http://support.microsoft.com/kb/816666> to restrict the hours and days that
a user may log on to a Windows Server 2003 domain. This could lead to
username enumeration.

*Issue*:- Microsoft Windows Active Directory Username Enumeration

*Criticality*:- Less Critical

*Impact*:- Exposure of system information

*Description*:- It has been identified that the Microsoft windows Active
Directory contains a flaw that may lead to an unauthorized information
disclosure. The issue is triggered when the Windows Domain Controller
returns different error messages depending on if a valid username was
supplied via windows terminal services. This only happens for the
user accounts that have time restrictions set and when these accounts
are accessed during restricted time. This can be exploited to help
enumerate valid usernames resulting in a loss of confidentiality.

*Vendors response*:-
"We will NOT be issuing a security update for this issue.
It is likely that in a next version or service pack of the product we may
consider making changes, but not before then".

*Screenshots:*
1. Error returned When Account is Accessed at Restricted
time<http://www.notsosecure.com/folder2/2007/05/27/logon-time-restrictions-in-a-domain-in-windows-server-2003-allows-username-enumeration/error-returned-when-account-is-accessed-at-restricted-time/>
2. Error returned When Account is Accessed at Permitted
time<http://www.notsosecure.com/folder2/wp-content/uploads/2007/05/error-when-account-is-accessed-at-permitted-time.PNG>


Thanks

Sid
www.notsosecure.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: