MS14-016: Vulnerability in Security Account Manager Remote (SAMR) Protocol Could Allow Security Feature Bypass (2934418)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by a security feature bypass
vulnerability.

Description :

A security feature bypass vulnerability exists in Windows due to the
Security Account Manager Remote (SAMR) protocol incorrectly validating
the user lockout state. Remote, authenticated attackers can exploit
this issue to conduct brute force attacks against user passwords.

Note that the host must have network connectivity to a domain
controller.

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms14-016

Solution :

Microsoft has released a set of patches for Windows 2003, XP, Vista,
2008, 2008 R2, 2012, 2012 R2, and Server Core installation option.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 72935 ()

Bugtraq ID: 66012

CVE ID: CVE-2014-0317