Vulnerability Note VU#818496
Microsoft Windows 2000 Workstation in mixed-mode domain may ignore domain account lockout restriction due to flaw in NTLM authentication
A flaw in certain configurations of Windows 2000 can allow an intruder to make an unlimited number of guesses to attempt to determine a password, despite policies intended to limit the number of guesses.
Domain administrators can set policies governing certain aspects of behavior within a domain. One of the policies that can be set is the number of failed password attempts before the account will be locked out. This is intended to prevent an intruder from attempting to guess a password through brute force. Under some circumstances, described in detail in Microsoft Security Bulletin MS-089, the policy can be circumvented, allowing an intruder to make repeated unlimited attempts to guess a password. The policy would be enforced relative to attempts to authenticate to the domain, but not relative to cached credentials.
An intruder can attempt to guess (possibly in an automated fashion) passwords on a Windows 2000 machine.
Apply the patches and workarounds described in http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25606.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft||Affected||-||30 Apr 2001|
CVSS Metrics (Learn More)
Our thanks to Microsoft for the information contained in their advisory, and to Finch Brett, who reported the information to Microsoft.
This document was written by Shawn V. Hernan.
- CVE IDs: Unknown
- Date Public: 21 Nov 2000
- Date First Published: 01 May 2001
- Date Last Updated: 25 Jun 2001
- Severity Metric: 3.15
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.