Microsoft Windows NTLM Information Disclosure Vulnerability
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
Many software products use HTTP requests for various features such as software update checking. A malicious user can intercept such requests (such as with a MITM proxy) and use HTTP Redirect to redirect the victim a malicious SMB server. If the redirect is a file:// URL and the victim is running Microsoft Windows, Windows will automatically attempt to authenticate to the malicious SMB server by providing the victim's user credentials to the server. These credentials can then be logged by the malicious server. The credentials are encrypted, but may be "brute-forced" to break the encryption.
Impact
- Information Disclosure
System / Technologies affected
- Microsoft Windows
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
NOTE: There is no patch available for this vulnerability.
Workaround:
- Block outbound SMB
- Update NTLM group policy
- Do not use NTLM for authentication by default in applications
- Use a strong password and change passwords frequently
More detail: http://www.kb.cert.org/vuls/id/672268
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with