Vulnerability CVE-2016-0049


Published: 2016-02-10

Description:
Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka "Windows Kerberos Security Feature Bypass."

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Windows Kerberos Security Feature Bypass (MS16-014)
Nabeel Ahmed
16.02.2016

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Microsoft -> Windows 10 
Microsoft -> Windows 7 
Microsoft -> Windows 8.1 
Microsoft -> Windows server 2008 
Microsoft -> Windows server 2012 
Microsoft -> Windows vista 

 References:
http://packetstormsecurity.com/files/135797/Windows-Kerberos-Security-Feature-Bypass.html
http://www.securityfocus.com/bid/82535
http://www.securitytracker.com/id/1034985
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014
https://www.exploit-db.com/exploits/39442/

Copyright 2024, cxsecurity.com

 

Back to Top