Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft fixed SMB NTLM relay attacks
updated since 12.11.2008
Published:26.04.2011
Source:
SecurityVulns ID:9428
Type:m-i-t-m
Threat Level:
5/10
Description:Microsoft fixed NTLM proxing vulnerability: credentials used for one services could be forwardedto different one. Attack is known for many years as NTLM weakness.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2008-4037 (Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.)
Original documentdocumentПоляков Александр, Re: [DSECRG-11-018] Kaspersky administration Kit - Remote code execution via SMBRelay (26.04.2011)
 documentПоляков Александр, Re: [DSECRG-11-018] Kaspersky administration Kit - Remote code execution via SMBRelay (26.04.2011)
 documentMICROSOFT, Microsoft Security Bulletin MS08-068 – Important Vulnerability in SMB Could Allow Remote Code Execution (957097) (12.11.2008)
Files:Microsoft Security Bulletin MS08-068 – Important Vulnerability in SMB Could Allow Remote Code Execution (957097)
 NTLM и корморативные сети / NTLM in Corporate Networks - in Russian

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod