Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Robert A. Rota (rota_cyberdocHOTMAIL.COM)
Date: Thu Apr 11 2002 - 11:15:56 CDT
Just to confirm MS' new hotfix for read locking GPOs is lame. the fix only monitors GPO read access and doesn't fix the root of the problem. Instead of fixing the implementation they just monitor and change read exclusives to shared reads. This leaves all other files vulnerable to read exclusives including scripts, shared documents and programs, etc. I tested it and found this but if you have found otherwise just post. In addition NT is still vulnerable. While not supporting GPOs, NT system policies and shared files are sitting ducks.
On to another vulnerability, what's up with Debploit? Geez, the whole word can have admin access on there boxes for how long now? nice security.
What about TCB exploits or covert channels? How many of you don't even know you are rooted? I think choosing an animal a little higher in the EAL scale might be in order if you are concerned about security. Otherwise, if MacGyver is your hero then keep a good supply of duct tape, hotfixes, and clothespins you may make it through the year. What you don't know wont hurt you.
** TO UNSUBSCRIBE DO NOT REPLY TO THIS MESSAGE!
** SEND ALL COMMANDS TO: LISTSERVLISTSERV.NTSECURITY.NET
** TO UNSUBSCRIBE, send the command "unsubscribe win2ksecadvice"
** FOR A WEEKLY DIGEST, send the command "set win2ksecadvice DIGEST"