Описание
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'.
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-1019
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1019
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1019
- http://packetstormsecurity.com/files/153639/Microsoft-Windows-HTTP-To-SMB-NTLM-Reflection-Privilege-Escalation.html
Связанные уязвимости
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.
Уязвимость службы Netlogon операционной системы Windows, позволяющаяя нарушителю обойти существующие ограничения безопасности