27. Work
OrderWork
OrderCorrective
Action ReportVulnerability:
Severity:
IP Address:
OS:
Fix:GetAdminHigh Risk215.011.200.255Windows NT 4.0From the Start menu, choose Programs/Administrative Tools/User Manager. Under Policies/User Rights, check the users who have admin privileges on that host. Stronger action may be needed, such as reinstalling the operating system from CD. Consider this host compromised, as well as any passwords from any other users on this host. In addition, Apply the post-SP3 getadmin patch, or SP4 when available. Also refer to Microsoft Knowledge Base Article Q146965.txt. ISS创新的安全技术
69. The CVE Editorial BoardCVE Editorial Board Members
Academic / Educational
Matt Bishop - UC Davis
Pascal Meunier - CERIAS
Alan Paller - SANS
Gene Spafford - CERIAS
Network Security Analysts
Eric Cole - Vista IT
Kelly Cooper - Genuity
Other Security Experts
Marc Dacier - IBM Research
Adam Shostack - Zero-Knowledge Systems
Intrusion Detection Experts
Stuart Staniford - Silicon Defense
Steve Northcutt - SANS
Software Vendors
Casper Dik - Sun Microsystems
David LeBlanc - Microsoft
Incident Response Teams
Ken Armstrong - CanCERT
Marvin Christensen - IBM Emergency Response Service (ERS)
Bill Fithen - CERT
Scott Lawler - DOD-CERT Tool Vendors
David Balenson - PGP Security, Network Associates
Andy Balinsky - Cisco
Scott Blake - BindView
Natalie Brader - Symantec
Rob Clyde - AXENT
Andre Frech - ISS
Patrick Heim - Hiverworld - NEW!
Kent Landfield - NFR
Jim Magdych - PGP Security, Network Associates
David Mann - BindView
Craig Ozancin - AXENT
Paul Proctor - CyberSafe
Mike Prosser - Symantec
Marcus Ranum - NFR - NEW!
Steve Schall - Intrusion.com
Steve Snapp - CyberSafe
Tom Stracener - Hiverworld
Bill Wall - Harris
Kevin Ziese - Cisco
Information Providers
Russ Cooper - NTBugtraq
Elias Levy - Security Focus
Ronson Nguyen - Ernst & Young
Ken Williams - eSecurityOnline.com - NEW!