Microsoft Windows 2000 Domain...

- AV AC AU C I A
发布: 2000-11-21
修订: 2025-04-13

Under certain circumstances, it is possible to bypass a domain account lockout policy on a local machine which would render this protective measure against brute force password attempts ineffective. The purpose of a domain account lockout policy is to disable an account after a certain number of unsuccessful login attempts. If this policy was not implemented, the password of a domain account could be guessed an unlimited number of times. Windows 2000 hosts in a non-2000 domain using NTLM authentication will fail to recognize a domain account lockout policy for users whose credentials are locally cached. Cached credentials contain the username and password in hashed form and are used in the event that the domain controller is not available to perform authentication. Windows 2000 systems that are not using NTLM to perform authentication are not susceptible to this vulnerability, therefore clients that are members of Windows 2000 domains would not be vulnerable because Kerberos...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息