Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-04016

Опубликовано: 11 авг. 2020
Источник: fstec
CVSS3: 10
CVSS2: 10
EPSS Критический

Описание

Уязвимость реализации протокола Netlogon Remote Protocol (MS-NRPC) операционных систем Windows связана с недостатками разграничения доступа к некоторым функциям. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, повысить свои привилегии с помощью специально созданного приложения

Вендор

Microsoft Corp
Canonical Ltd.
Сообщество свободного программного обеспечения
ООО «РусБИТех-Астра»
Novell Inc.
Fedora Project
Samba Team
АО "НППКТ"
АО «Концерн ВНИИНС»

Наименование ПО

Windows Server 2012
Windows Server 2012 R2
Windows Server 2008 R2 Service Pack 1
Ubuntu
Windows Server 2016
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016 (Server Core installation)
Debian GNU/Linux
Windows Server 2008 R2 Service Pack 1 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Astra Linux Special Edition
Windows Server 1903 (Server Core Installation)
OpenSUSE Leap
Windows Server 1909 (Server Core Installation)
Fedora
Windows Server 2004 (Server Core Installation)
Samba
ОСОН ОСнова Оnyx
Windows Server 2012 (Server Core installation)
ОС ОН «Стрелец»

Версия ПО

- (Windows Server 2012)
- (Windows Server 2012 R2)
- (Windows Server 2008 R2 Service Pack 1)
16.04 LTS (Ubuntu)
- (Windows Server 2016)
- (Windows Server 2012 R2 (Server Core installation))
- (Windows Server 2016 (Server Core installation))
9 (Debian GNU/Linux)
- (Windows Server 2008 R2 Service Pack 1 (Server Core installation))
18.04 LTS (Ubuntu)
- (Windows Server 2019)
- (Windows Server 2019 (Server Core installation))
1.6 «Смоленск» (Astra Linux Special Edition)
8.0 (Debian GNU/Linux)
- (Windows Server 1903 (Server Core Installation))
15.1 (OpenSUSE Leap)
14.04 ESM (Ubuntu)
10 (Debian GNU/Linux)
- (Windows Server 1909 (Server Core Installation))
32 (Fedora)
- (Windows Server 2004 (Server Core Installation))
до 4.12.5 включительно (Samba)
1.7 (Astra Linux Special Edition)
4.7 (Astra Linux Special Edition)
до 2.1 (ОСОН ОСнова Оnyx)
- (Windows Server 2012 (Server Core installation))
до 16.01.2023 (ОС ОН «Стрелец»)

Тип ПО

Операционная система
Сетевое программное средство

Операционные системы и аппаратные платформы

Microsoft Corp Windows Server 2012 -
Microsoft Corp Windows Server 2012 R2 -
Microsoft Corp Windows Server 2008 R2 Service Pack 1 -
Canonical Ltd. Ubuntu 16.04 LTS
Microsoft Corp Windows Server 2016 -
Microsoft Corp Windows Server 2012 R2 (Server Core installation) -
Microsoft Corp Windows Server 2016 (Server Core installation) -
Сообщество свободного программного обеспечения Debian GNU/Linux 9
Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) -
Canonical Ltd. Ubuntu 18.04 LTS
Microsoft Corp Windows Server 2019 -
Microsoft Corp Windows Server 2019 (Server Core installation) -
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.6 «Смоленск»
Сообщество свободного программного обеспечения Debian GNU/Linux 8.0
Microsoft Corp Windows Server 1903 (Server Core Installation) -
Novell Inc. OpenSUSE Leap 15.1
Canonical Ltd. Ubuntu 14.04 ESM
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Microsoft Corp Windows Server 1909 (Server Core Installation) -
Fedora Project Fedora 32
Microsoft Corp Windows Server 2004 (Server Core Installation) -
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.7
ООО «РусБИТех-Астра» Astra Linux Special Edition 4.7
Microsoft Corp Windows Server 2012 (Server Core installation) -
АО «Концерн ВНИИНС» ОС ОН «Стрелец» до 16.01.2023

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)
Критический уровень опасности (базовая оценка CVSS 3.0 составляет 10)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
Для программных продуктов Мicrosoft Corp.:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Для Samba:
https://www.samba.org/samba/security/CVE-2020-1472.html
Для Debian:
https://security-tracker.debian.org/tracker/CVE-2020-1472
Для программных продуктов Novell Inc.:
https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/
Для Ubuntu:
https://ubuntu.com/security/notices/USN-4510-1
https://ubuntu.com/security/notices/USN-4510-2
Для ОС Astra Linux:
использование рекомендаций производителя:
https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20200921SE16MD
Для ОС ОН «Стрелец»:
Обновление программного обеспечения samba до версии 2:4.13.17+repack-1osnova1strelets

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 100%
0.9438
Критический

10 Critical

CVSS3

10 Critical

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 5 лет назад

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, custome...

CVSS3: 9.8
redhat
около 5 лет назад

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, custome...

CVSS3: 5.5
nvd
около 5 лет назад

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers

CVSS3: 10
msrc
около 5 лет назад

Netlogon Elevation of Privilege Vulnerability

CVSS3: 5.5
debian
около 5 лет назад

An elevation of privilege vulnerability exists when an attacker establ ...

EPSS

Процентиль: 100%
0.9438
Критический

10 Critical

CVSS3

10 Critical

CVSS2