Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2015-0005

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2015-0005
Last Modified 01 Oct 2015 01:11:52
Published 11 Mar 2015 06:59:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector ADJACENT_NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2015-0005

Summary

The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."

Vulnerable Systems

Operating System

  • Microsoft Windows 2003 Server

  • Microsoft Windows Server 2008

  • Microsoft Windows Server 2008 R2

  • Microsoft Windows Server 2012 -

  • Microsoft Windows Server 2012 R2


References

MS - MS15-027

SECTRACK - 1031891

MISC - http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation

FULLDISC - 20150310 [CORE-2015-0005] - Windows Pass-Through Authentication Methods Improper Validation

MISC - http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html

Related Patches

MS15-027 Security Update for Windows Server 2003 (KB3002657)

MS15-027 Security Update for Windows Server 2008 (KB3002657)

MS15-027 Security Update for Windows Server 2008 x64 (KB3002657)

MS15-027 Security Update for Windows Server 2003 x64 (KB3002657)


Last Updated: 27 May 2016 11:08:02