How to Buy
This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote Windows host is affected by a security feature bypass
A security feature bypass vulnerability exists in Windows due to the
Security Account Manager Remote (SAMR) protocol incorrectly validating
the user lockout state. Remote, authenticated attackers can exploit
this issue to conduct brute force attacks against user passwords.
Note that the host must have network connectivity to a domain
See also :
Microsoft has released a set of patches for Windows 2003, XP, Vista,
2008, 2008 R2, 2012, 2012 R2, and Server Core installation option.
Risk factor :
Medium / CVSS Base Score : 5.4
CVSS Temporal Score : 4.7
Public Exploit Available : false
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 72935 ()
Bugtraq ID: 66012
CVE ID: CVE-2014-0317
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.