

DOVES Vulnerability V-00200
DOVES Project
Computer Security Laboratory
Department of Computer Science
University of California at Davis
Brief summary: When explorer.exe is loaded, it is identified using a relative path name.
Detailed description: The registry entry that specifies the Windows Shell executable (explorer.exe) uses a relative, rather than an absolute, path name. Windows searches directories for the executable in the following order:
Components: Explorer.exe, Msgina.dll, Userinit.exe
Operating system(s): Microsoft Windows NT 4.0 Workstation, Microsoft Windows NT 4.0 Server, Microsoft Windows NT 4.0 Server, Enterprise Edition, Microsoft Windows NT 4.0 Server, Terminal Server Edition, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced ServerThe attacker can cause any user logging into the system to execute a program during the login process.
How to detect: Look for a file named "explorer.exe" in the root directory of "%SystemDrive%"
How to fix:
Other information:
PA Classification:
RISOS Classification:
Common Vulnerability Exposure: The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability. [CAN-2000-0663]
Attacks: See Doves exploit #110.
Advisories:
Related DOVES entries:
Who reported it: Alberto Aragone in Quimeras web site Executable path searching vulnerability in Windows NT/2000 on July 26, 2000
Send email to doves@cs.ucdavis.edu
Department of Computer Science
University of California at Davis
One Shields Ave.
Davis, CA 95616-8562
Dove images © 1999-2000 www.barrysclipart.com