[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-0005Date: (C)2015-03-13   (M)2023-12-22


The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 5.5
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1031891
http://seclists.org/fulldisclosure/2015/Mar/60
MS15-027
http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html
http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation
https://www.samba.org/samba/history/samba-4.2.10.html

CPE    4
cpe:/o:microsoft:windows_2003_server::sp2
cpe:/o:microsoft:windows_server_2012:-
cpe:/o:microsoft:windows_server_2008:r2:sp1
cpe:/o:microsoft:windows_server_2008::sp2
...
CWE    1
CWE-254
OVAL    4
oval:org.secpod.oval:def:23739
oval:org.secpod.oval:def:23740
oval:org.secpod.oval:def:602527
oval:org.secpod.oval:def:602466
...

© SecPod Technologies