search for: q143474

Displaying 4 results from an estimated 4 matches for "q143474".

2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
...t;'guest'/'guest' > >It was possible to log into the remote host using a NULL session. >The concept of a NULL session is to provide a null username and >a null password, which grants the user the 'guest' access > >To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and >Q246261 (Windows 2000). >Note that this won't completely disable null sessions, but will >prevent them from connecting to IPC$ >Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html > >The remote host defaults to guest when a user logs in using...
2003 Dec 16
3
Results of nessus scan
...ctor : Low 127.0.0.1|netbios-ssn (139/tcp)|10394|REPORT| . It was possible to log into the remote host using a NULL session. The concept of a NULL session is to provide a null username and a null password, which grants the user the 'guest' access To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261 (Windows 2000). Note that this won't completely disable null sessions, but will prevent them from connecting to IPC$. Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html. All the smb tests will be done as ''/'whatever' in domain
2004 Jun 23
0
samba security question - samba vulnerable to any Windows Exploits?
...#39;guest'/'' 'guest'/'guest' It was possible to log into the remote host using a NULL session. The concept of a NULL session is to provide a null username and a null password, which grants the user the 'guest' access To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261 (Windows 2000). Note that this won't completely disable null sessions, but will prevent them from connecting to IPC$ Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html The remote host defaults to guest when a user logs in using an invalid login. For i...
2004 Jun 23
0
samba security question - samba vulnerable to anyWindowsExploits?
...t;'guest'/'guest' > >It was possible to log into the remote host using a NULL session. >The concept of a NULL session is to provide a null username and >a null password, which grants the user the 'guest' access > >To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and >Q246261 (Windows 2000). >Note that this won't completely disable null sessions, but will >prevent them from connecting to IPC$ >Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html > >The remote host defaults to guest when a user logs in using...