{ "id": "CVE-2015-0005", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:00.087", "lastModified": "2024-11-21T02:22:10.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka \"NETLOGON Spoofing Vulnerability.\"" }, { "lang": "es", "value": "El servicio NETLOGON en Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 y R2 SP1, y Windows Server 2012 Gold y R2, cuando un controlador de dominios est\u00e1 configurado, permite a atacantes remotos falsificar el nombre del ordenador del endpoint de un canal seguro, y obtener informaci\u00f3n sensible, mediante el funcionamiento de una aplicaci\u00f3n manipulada y el aprovechamiento de la capacidad de capturar trafico de la red, tambi\u00e9n conocido como 'vulnerabilidad de falsificaci\u00f3n de NETLOGON.'" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N", "baseScore": 4.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-254" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*", "matchCriteriaId": "32BCD530-F6E2-4F9B-AD4C-7DF2BED00296" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*", "matchCriteriaId": "A1318333-EF3A-4DBA-8DD7-367BF843F70D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*", "matchCriteriaId": "74B5E7C1-6C1D-4605-91CF-AF105EFA678D" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html", "source": "secure@microsoft.com", "tags": [ "Exploit" ] }, { "url": "http://seclists.org/fulldisclosure/2015/Mar/60", "source": "secure@microsoft.com" }, { "url": "http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation", "source": "secure@microsoft.com", "tags": [ "Exploit" ] }, { "url": "http://www.securitytracker.com/id/1031891", "source": "secure@microsoft.com" }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-027", "source": "secure@microsoft.com" }, { "url": "https://www.samba.org/samba/history/samba-4.2.10.html", "source": "secure@microsoft.com" }, { "url": "http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://seclists.org/fulldisclosure/2015/Mar/60", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.securitytracker.com/id/1031891", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-027", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://www.samba.org/samba/history/samba-4.2.10.html", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }