Security Bulletin
Microsoft Security Bulletin MS00-004 - Important
Patch Available for 'RDISK Registry Enumeration File' Vulnerability
Published: January 21, 2000 | Updated: February 04, 2000
Version: 1.0
Originally Posted: January 21, 2000
Revised: February 4, 2000
Summary
On January 21, 2000, Microsoft released the original version of this bulletin, discussing a security vulnerability in a Microsoft® Windows NT 4.0 administrative utility. The original version of the bulletin discussed the vulnerability within the context of Windows NT 4.0 Server, Terminal Server Edition. However, we have since learned of scenarios under which the vulnerability could also affect Windows NT 4.0 servers and workstations, and have revised the bulletin accordingly.
The utility creates a temporary file during execution that can contain security-sensitive information, but does not appropriately restrict access to it. Under certain conditions, it could be possible for a malicious user to read the file as it was being created
Frequently asked questions regarding this vulnerability can be found at https://www.microsoft.com/technet/security/bulletin/fq00-004.mspx.
General Information
Issue
The RDISK utility is used to create an Emergency Repair Disk (ERD) in order to record machine state information as a contingency against system failure. During execution, RDISK creates a temporary file containing an enumeration of the registry. The ACLs on the file allow global read permission, and as a result, a malicious user who knew that the administrator was running RDISK could open the file and read the registry enumeration information as it was being created. RDISK erases the file upon successful completion, so under normal conditions there would be no lasting vulnerability.
By default, the file is not shared and therefore could not be read by other network users.
Affected Software Versions
- Microsoft Windows NT 4.0 Workstation
- Microsoft Windows NT 4.0 Server
- Microsoft Windows NT 4.0, Enterprise Edition
- Microsoft Windows NT 4.0, Terminal Server Edition
Vulnerability Identifier: CVE-2000-0089
Patch Availability
Windows NT 4.0 Workstation; Windows NT 4.0 Server; Windows NT 4.0 Server, Enterprise Edition:
Intel: https://www.microsoft.com/Downloads/details.aspx?displaylang=en&FamilyID;=163B4FEF-DF1C-43AF-B4F0-CF91BBB42FA6Windows NT 4.0 Server, Terminal Server Edition:
https://www.microsoft.com/Downloads/details.aspx?displaylang=en&FamilyID;=45115036-D197-4B82-89EB-87ABC17CB3F8NOTE: Additional security patches are available at the Microsoft Download Center
More Information
Please see the following references for more information related to this issue.
Frequently Asked Questions: Microsoft Security Bulletin MS00-004,
https://www.microsoft.com/technet/security/bulletin/fq00-004.mspx.Microsoft Knowledge Base (KB) article 249108, Registry Data Is Viewable By All Users After Rdisk Repair Update,
https://support.microsoft.com/default.aspx?scid=kb;en-us;249108.Microsoft Knowledge Base (KB) article 156328, Description of Windows NT Emergency Repair Disk,
https://support.microsoft.com/default.aspx?scid=kb;en-us;156328Microsoft Security web site,
https://www.microsoft.com/technet/security/default.mspx.
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft Technical Support is available at https://support.microsoft.com/contactussupport/?ws=support.
Acknowledgments
Microsoft thanks Arne Vidstrom (https://ntsecurity.nu) for reporting this issue to us and working with us to protect customers.
Revisions
- January 21, 2000: Bulletin Created.
- February 4, 2000: Bulletin revised to address other affected versions
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Built at 2014-04-18T13:49:36Z-07:00