Summary
This host is missing an important security update according to Microsoft advisory (2862152).
Impact
Successful exploitation will allow an attacker to intercept the target user's network traffic and potentially determine their encrypted domain credentials.
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/advisory/2862152
Insight
The flaw is due to improper verification of DirectAccess server connections to DirectAccess clients by DirectAccess.
Affected
Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1 x32/x64
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-3876 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:C/I:N/A:N
Related Vulnerabilities
- Consent User Interface Privilege Escalation Vulnerability (2442962)
- Cumulative Security Update for Internet Explorer (953838)
- Microsoft .NET Framework Multiple Vulnerabilities (2916607)
- Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)