|Main Archive Page > Month Archives > full-disclosure-uk archives|
Windows Server 2003 can be configured
<http://support.microsoft.com/kb/816666> to restrict the hours and days that a user may log on to a Windows Server 2003 domain. This could lead to username enumeration.
*Issue*:- Microsoft Windows Active Directory Username Enumeration
*Criticality*:- Less Critical
*Impact*:- Exposure of system information
*Description*:- It has been identified that the Microsoft windows Active
Directory contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the Windows Domain Controller returns different error messages depending on if a valid username was supplied via windows terminal services. This only happens for the user accounts that have time restrictions set and when these accounts are accessed during restricted time. This can be exploited to help enumerate valid usernames resulting in a loss of confidentiality.
"We will NOT be issuing a security update for this issue. It is likely that in a next version or service pack of the product we may consider making changes, but not before then".
1. Error returned When Account is Accessed at Restricted time<http://www.notsosecure.com/folder2/2007/05/27/logon-time-restrictions-in-a-domain-in-windows-server-2003-allows-username-enumeration/error-returned-when-account-is-accessed-at-restricted-time/> 2. Error returned When Account is Accessed at Permitted time<http://www.notsosecure.com/folder2/wp-content/uploads/2007/05/error-when-account-is-accessed-at-permitted-time.PNG>