[NT] NetOp School Admin Vulnerability (Authorization Bypass)

From: support@securiteam.com
Date: 09/22/01

From: support@securiteam.com
To: list@securiteam.com
Subject: [NT] NetOp School Admin Vulnerability (Authorization Bypass)
Message-Id: <20010922084128.55365138C1@mail.der-keiler.de>
Date: Sat, 22 Sep 2001 10:41:28 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  NetOp School Admin Vulnerability (Authorization Bypass)


Feature-rich <http://www.crossteccorp.com/netopschool/index.html> NetOp
School puts teachers and corporate trainers center stage in networked
classrooms or Internet-based virtual classrooms. A security vulnerability
in the product allows local unprivileged users to gain administrative
access of the NetOp product.


Vulnerable systems:
NetOp School version 1.5

By default when a user logs into a workstation the student version of
NetOp is run. If a user (student) attempts to execute the admin version of
NetOp then the required password dialog will appear and the user will need
to know that password if they wish to run the program. The flaw is in the
way the program reacts when the student version is not running. For
example, a student can use any type of task manager to kill the student
version and when he or she goes to open the admin version all security
checks and password dialogs are bypassed.

This gives the student or non-authorized user full access to any
workstation logged in to the network. It also allows users to "spy" on
anybody in the network.


The information has been provided by <mailto:trick0rdaddy@hotmail.com>
Jesse Smythe.


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

Relevant Pages

  • Re: Remotesoftware-Fernwartung!
    ... zentral auf dem sogenannten NetOp Log oder NetOp Security Server abgelegt und können jederzeit wieder angeschaut werden. ... Der Serverteil nennt sich dabei NetOP-Host, ... Z.B. kann NetOP so konfiguriert werden, daß beim Zugriff auf die NetOP-Hosts eine Anmeldung mit einem NetOP-User notwendig ist, der auf dem NetOP-Security-Server verwaltet wird, welcher wiederum z.B. in ein AD integriert sein kann. ...
  • SecurityFocus Microsoft Newsletter #174
    ... This issue sponsored by: Tenable Network Security ... the worlds only 100% passive vulnerability ... MICROSOFT VULNERABILITY SUMMARY ... Novell Netware Enterprise Web Server Multiple Vulnerabilitie... ...
  • SecurityFocus Microsoft Newsletter #165
    ... Tenable Security ... distribute, manage, and communicate vulnerability and intrusion detection ... Microsoft Internet Explorer MHTML Forced File Execution Vuln... ...
  • [NT] Cumulative Security Update for Internet Explorer (MS04-038)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Get your security news from a reliable source. ... CSS Heap Memory Corruption Vulnerability, ... Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6 ...
  • SecurityFocus Microsoft Newsletter #171
    ... Better Management for Network Security ... GoodTech Telnet Server Remote Denial Of Service Vulnerabilit... ... ASPApp PortalAPP Remote User Database Access Vulnerability ...