Microsoft Windows SMB 来宾帐户本地用户访问

high Nessus 插件 ID 26919

简介

It is possible to log into the remote host.

描述

远程主机正在运行 Microsoft Windows 操作系统之一或 SAMBA 后台程序。可以使用随机帐户以来宾身份登录到该主机。

解决方案

In the group policy change the setting for 'Network access: Sharing and security model for local accounts' from 'Guest only - local users authenticate as Guest' to 'Classic - local users authenticate as themselves'. Disable the Guest account if applicable.

If the SAMBA daemon is running, double-check the SAMBA configuration around guest user access and disable guest access if appropriate

插件详情

严重性: High

ID: 26919

文件名: smb_guest_account.nasl

版本: 1.19

类型: remote

代理: windows

系列: Windows

发布时间: 2007/10/4

最近更新时间: 2020/9/21

支持的传感器: Nessus

风险信息

CVSS 分数理由: Av:n is justified since the plugin tries to login via network services. nist specifies that the vulnerability pertains to a domain user. given that the plugin only tests for a guest account, which likely has limited permissions, the cia is partial instead of complete.

VPR

风险因素: Medium

分数: 5.9

CVSS v2

风险因素: High

基本分数: 7.5

矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS 分数来源: CVE-1999-0505

漏洞信息

CPE: cpe:/o:microsoft:windows

必需的 KB 项: SMB/guest_enabled

可利用: true

易利用性: Exploits are available

漏洞发布日期: 1999/1/1

可利用的方式

Metasploit (Microsoft Windows Authenticated Powershell Command Execution)

参考资料信息

CVE: CVE-1999-0505