search menu icon-carat-right cmu-wordmark

CERT Coordination Center

The default NTFS permissions are not applied to a converted boot partition on Microsoft Windows 2000 and Windows XP systems when CONVERT.EXE is used

Vulnerability Note VU#361065

Original Release Date: 2002-11-19 | Last Revised: 2002-11-19

Overview

Several commercial desktops and laptops from OEM distributors ship with insecure permissions set on files and directories. It has been confirmed that this is due to the use of Microsoft's CONVERT.EXE utility.

Description

Microsoft's CONVERT.EXE program is used to convert FAT32 file systems to NTFS. There is an insecure directory permission vulnerability introduced when the CONVERT.EXE utility is used on Windows 2000 and Windows XP systems. It has been confirmed that OEM distributors of Microsoft Windows XP and Windows 2000 use this utility and subsequently ship some desktop and laptop machines with the insecure permissions. Laptops and desktops that ship with the OEM version of these operating systems may be vulnerable.

Microsoft's KB article Q237399 discusses this issue with relation to Windows 2000.

Impact

A local attacker may be able to execute arbitrary code with elevated privileges. This would require another user to log in to the system.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Check the permissions set on system critical directories such as C:\, C:\Documents and Settings\All Users, C:\Documents and Settings\All Users\Desktop, C:\Documents and Settings\All Users\Start Menu, and the System Restore directories.

Vendor Information

361065
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Douglas Swiggum for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2002-0034
Severity Metric: 6.75
Date Public: 2002-10-30
Date First Published: 2002-11-19
Date Last Updated: 2002-11-19 20:12 UTC
Document Revision: 21

Sponsored by CISA.