{"vuid":"VU#818496","idnumber":"818496","name":"Microsoft Windows 2000 Workstation in mixed-mode domain may ignore domain account lockout restriction due to flaw in NTLM authentication","keywords":["security","microsoft","NTLM","domain","Windows 2000","MS00-089"],"overview":"A flaw in certain configurations of Windows 2000 can allow an intruder to make an unlimited number of guesses to attempt to determine a password, despite policies intended to limit the number of guesses.","clean_desc":"Domain administrators can set policies governing certain aspects of behavior within a domain. One of the policies that can be set is the number of failed password attempts before the account will be locked out. This is intended to prevent an intruder from attempting to guess a password through brute force. Under some circumstances, described in detail in Microsoft Security Bulletin MS-089, the policy can be circumvented, allowing an intruder to make repeated unlimited attempts to guess a password. The policy would be enforced relative to attempts to authenticate to the domain, but not relative to cached credentials.","impact":"An intruder can attempt to guess (possibly in an automated fashion) passwords on a Windows 2000 machine.","resolution":"Apply the patches and workarounds described in http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25606.","workarounds":"","sysaffected":"","thanks":"Our thanks to Microsoft for the information contained in their advisory, and to Finch Brett, who reported the information to Microsoft.","author":"This document was written by Shawn V. Hernan.","public":["http://www.securityfocus.com/bid/1973","http://www.microsoft.com/technet/security/bulletin/ms00-089.asp","http://www.microsoft.com/technet/security/bulletin/fq00-089.asp"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-12-12T22:49:21Z","publicdate":"2000-11-21T00:00:00Z","datefirstpublished":"2001-05-01T04:07:31Z","dateupdated":"2001-06-26T02:19:35Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"14","cam_impact":"5","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.15","cam_scorecurrentwidelyknown":"3.15","cam_scorecurrentwidelyknownexploited":"5.775","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.15,"vulnote":null}