Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17157
HistoryJun 01, 2007 - 12:00 a.m.

[Full-disclosure] Microsoft Windows Active Directory Logon Hours User Enumeration Weakness

2007-06-0100:00:00
vulners.com
8

Windows Server 2003 can be configured
<http://support.microsoft.com/kb/816666&gt; to restrict the hours and days that
a user may log on to a Windows Server 2003 domain. This could lead to
username enumeration.

Issue:- Microsoft Windows Active Directory Username Enumeration

Criticality:- Less Critical

Impact:- Exposure of system information

Description:- It has been identified that the Microsoft windows Active
Directory contains a flaw that may lead to an unauthorized information
disclosure. The issue is triggered when the Windows Domain Controller
returns different error messages depending on if a valid username was
supplied via windows terminal services. This only happens for the
user accounts that have time restrictions set and when these accounts
are accessed during restricted time. This can be exploited to help
enumerate valid usernames resulting in a loss of confidentiality.

Vendors response:-
"We will NOT be issuing a security update for this issue.
It is likely that in a next version or service pack of the product we may
consider making changes, but not before then".

Screenshots:

  1. Error returned When Account is Accessed at Restricted
    time<http://www.notsosecure.com/folder2/2007/05/27/logon-time-restrictions-in-a-domain-in-windows-server-2003-allows-username-enumeration/error-returned-when-account-is-accessed-at-restricted-time/&gt;
  2. Error returned When Account is Accessed at Permitted
    time<http://www.notsosecure.com/folder2/wp-content/uploads/2007/05/error-when-account-is-accessed-at-permitted-time.PNG&gt;

Thanks

Sid
www.notsosecure.com