MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by a security feature bypass
vulnerability.

Description :

A security feature bypass vulnerability exists in Windows due to the
way the IP-HTTPS Component handles certificates. The vulnerability
could allow security feature bypass if an attacker presents a revoked
certificate to an IP-HTTPS server commonly used in Microsoft
DirectAccess deployments. To exploit the vulnerability, the attacker
must use a certificate issued from the domain for IP-HTTPS server
authentication.

Successful exploitation of this vulnerability could allow the attacker
to bypass certificate validation checks. Logging on to a system inside
the organization would still require system or domain credentials.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms12-083

Solution :

Microsoft has released a set of patches for Windows 2008 R2 and 2012.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 63230 ()

Bugtraq ID: 56840

CVE ID: CVE-2012-2549