Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.805145
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows NETLOGON Spoofing Vulnerability (3002657)
Zusammenfassung:This host is missing an important security; update according to Microsoft Bulletin MS15-027.
Beschreibung:Summary:
This host is missing an important security
update according to Microsoft Bulletin MS15-027.

Vulnerability Insight:
Flaw is due to Netlogon service improperly
establishes a secure communications channel belonging to a different machine
with a spoofed computer name.

Vulnerability Impact:
Successful exploitation will allow remote
man-in-the-middle attacker to conduct SMB relay attacks on domain environments
utilizing SMB Signing enforcement, and decrypt SMB3 communications intercepted.

Affected Software/OS:
- Microsoft Windows Server 2012/R2

- Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior

- Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior

- Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
4.3

CVSS Vector:
AV:A/AC:M/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-0005
http://seclists.org/fulldisclosure/2015/Mar/60
http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html
http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation
Microsoft Security Bulletin: MS15-027
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-027
http://www.securitytracker.com/id/1031891
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.