NT Subst.exe Vulnerability...

- AV AC AU C I A
发布: 1999-11-30
修订: 2025-04-13

The SUBST command is used to map a drive letter to a folder on an existing drive. This command can be run by any user. After it is run, the mapping stays in effect until it is deleted, by issuing the subst command again with the /d option, or until the machine is rebooted. Loggin off does not remove the mapping. Therefore, it is possible for one console user to map a drive letter to a a folder of their choosing, and then log off, leaving the mapping intact for the next user. If the next user tries to manually map a differnt location to that letter, they will get an error 85, "The local device name is already in use." However, if the drive letter used is the same as their network-mapped home drive, the operation will fail without any error message. From the user's perspective, nothing obvious will happen to let them know that their 'home drive' is not their usual home drive t all. This opens the possibility of getting a user to run trojaned or malicious programs, as well as the...

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息