First published: Tue Aug 20 2002(Updated: )
NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows Terminal Services using RDP | ||
Microsoft Windows Terminal Services using RDP | =sp1 | |
Microsoft Windows Terminal Services using RDP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0725 is considered a moderate security vulnerability that can allow local attackers to evade audit trails.
Mitigation for CVE-2002-0725 involves updating to a more secure version of Windows that does not support this vulnerability.
CVE-2002-0725 affects Windows NT 4.0 and Windows 2000, specifically SP1 and SP2 versions.
Exploiting CVE-2002-0725 can allow local users to manipulate audit logs and conceal file access activity.
No, CVE-2002-0725 requires local access to the affected system to exploit the vulnerability.