COMMAND                                            SOURCE: 


  Win NT 3.5, 3.51, 4.0


    This vulnerability was originally presented on:

    and this text is their credit.

    NT secured filesystem (NTFS) can be read from  DOS/Windows/Windows
    95,  bypassing  filesystem  security.  A  hacker  could boot an NT
    system  from  a   DOS  floppy  with   ntfsdos.exe  and  read   all
    information on hard-disk.

    A NTFS-read capable  'ntfsdos.exe' driver is  available publically
    to locally mount  an NTFS volume,  a read/write version  (v1.5) is
    expected  soon.  This  will  allow   a  hacker  to  alter   system

    The  program,  named  NTFSDOS.EXE,  can  be  used  to  read drives
    formatted  with  NT's  proprietary  file  system, NTFS. By placing
    NTFSDOS.EXE on a  DOS boot floppy  and booting an  NT machine with
    it,  a  user  can  see  password  files,  security  features   and
    administration databases.  (Previously, only NT itself could  read
    NTFS-formatted drives.)

    Because NTFSDOS.EXE doesn't work through NT, it ignores user-based
    permissions and  allows anyone  access to  every byte  on an  NTFS
    drive.  Since NTFS doesn't normally encrypt data, unencrypted text
    and data files are directly readable-even with something as simple
    as the DOS TYPE command.




    Disallow  access  to  floppy  disk  until  needed,  monitor the NT
    systems  with  Systems  Management  Server,  use the system's BIOS
    password protection, and disable floppy booting.