MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)

medium Nessus Plugin ID 63230

Synopsis

The remote Windows host is affected by a security feature bypass vulnerability.

Description

A security feature bypass vulnerability exists in Windows due to the way the IP-HTTPS Component handles certificates. The vulnerability could allow security feature bypass if an attacker presents a revoked certificate to an IP-HTTPS server commonly used in Microsoft DirectAccess deployments. To exploit the vulnerability, the attacker must use a certificate issued from the domain for IP-HTTPS server authentication.

Successful exploitation of this vulnerability could allow the attacker to bypass certificate validation checks. Logging on to a system inside the organization would still require system or domain credentials.

Solution

Microsoft has released a set of patches for Windows 2008 R2 and 2012.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-083

Plugin Details

Severity: Medium

ID: 63230

File Name: smb_nt_ms12-083.nasl

Version: 1.10

Type: local

Agent: windows

Published: 12/11/2012

Updated: 12/4/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2012-2549

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 12/11/2012

Vulnerability Publication Date: 12/11/2012

Reference Information

CVE: CVE-2012-2549

BID: 56840

IAVB: 2012-B-0122

MSFT: MS12-083

MSKB: 2765809