The Netlogon service in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2 does not properly implement domain-controller communication, which allows remote attackers to discover credentials by leveraging certain PDC access and spoofing the BDC role in a PDC communication channel, aka "Elevation of Privilege Vulnerability in Netlogon."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/75633 - | |
References | () http://www.securitytracker.com/id/1032900 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-071 - |
Information
Published : 2015-07-14 21:59
Updated : 2024-11-21 02:27
NVD link : CVE-2015-2374
Mitre link : CVE-2015-2374
CVE.ORG link : CVE-2015-2374
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_server_2012
- windows_2003_server
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor