Security bypass vulnerability in SAMR protocol in Microsoft WindowsID: oval:org.secpod.oval:def:16983 | Date: (C)2014-03-12 (M)2023-12-14 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft Active Directory or Active Directory Application Mode (ADAM) or Active Directory Lightweight Directory Service (AD LDS) or Active Directory Services and is prone to security bypass vulnerability. A flaw is present in an application, which fails to handle validation of user lockout state. Successful exploitation could allow attackers to cause brute force attacks against user passwords.
Platform: |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Product: |
Active Directory |
Active Directory Application Mode |
Active Directory Lightweight Directory Service |