|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows: brute force via SAMR
Synthesis of the vulnerability
An attacker can use SAMR to exploit a brute force, in order to guess the password of a Windows user.
Vulnerable software: Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows Vista, Windows XP.
Severity of this announce: 2/4.
Consequences of an intrusion: user access/rights.
Attacker's origin: intranet client.
Creation date: 11/03/2014.
Références of this computer vulnerability: 2934418, CERTFR-2014-AVI-122, CVE-2014-0317, MS14-016, VIGILANCE-VUL-14407.
Description of the vulnerability
The SAMR (Security Account Manager Remote) protocol is used to manipulate the user database.
However, the account lockout is not managed.
An attacker can therefore use SAMR to exploit a brute force, in order to guess the password of a Windows user.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability bulletin. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.