Skip to main content

Microsoft NETLOGON Spoofing Vulnerability

Last Update Date: 12 Mar 2015 Release Date: 11 Mar 2015 3627 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS

A spoofing vulnerability exists in NETLOGON that is caused when the Netlogon service improperly establishes a secure communications channel belonging to a different machine with a spoofed computer name. To successfully exploit this vulnerability, an attacker would first have to be logged on to a domain joined system and be able to observe network traffic. An attacker could then run a specially crafted application that could establish a secure channel connection belonging to different computer. An attacker may be able to use the established secure channel to obtain session-related information for the actual secure channel of the spoofed computer. Workstations and servers are primarily at risk from this vulnerability. The update addresses the vulnerability by modifying the way that Netlogon handles establishing secure channels.


Impact

  • Spoofing

System / Technologies affected

  • Windows Server 2003
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012 and Windows Server 2012 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link