Re: [Full-disclosure] run as local denial-of-service enables administrative account processes to be killed

2007-06-26 Thread James C. Slora Jr.
Eitan Caspi wrote Saturday, June 23, 2007 4:45 PM Summary: While a user, at any security membership level, is logged in locally, using the run as feature, it can kill all of the processes running under the user who initiated the run as feature, even if the initiating user has a security

[Full-disclosure] run as local denial-of-service enables administrative account processes to be killed

2007-06-23 Thread Eitan Caspi
Suggested severity level: Medium. Type of Risk: Denial of Service. Local / Remote activated: Local. Affected Software: Windows XP Professional with SP2 and all of the security updates up to 5-May-2007. Windows 2003 standard server, revision R2 was tested also a found to be NOT vulnerable.

Re: [Full-disclosure] run as local denial-of-service enables administrative account processes to be killed

2007-06-23 Thread KJK::Hyperion
Eitan Caspi wrote: I'm confused. It escapes me, really. There is no excuse not to know exactly when, why and how anything happens on a Windows machine, not with the excellent, affordable tracing tools we have at our disposal in this time and age. I loathe the term security researchers - it