MS KB3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing

medium Nessus Plugin ID 86149

Synopsis

The remote Windows host has an out-of-date SSL certificate blacklist.

Description

The remote host is missing KB3097966, KB2677070 (automatic updater), or the latest disallowed certificate update using KB2813430 (manual updater). If KB2677070 has been installed, it has not yet obtained the latest auto-updates.

Note that this plugin checks that the updaters have actually updated the disallowed CTL list, not that the KBs listed are installed. This approach was taken since the KB2677070 automatic updater isn't triggered unless software that relies on SSL in the Microsoft Cryptography API is being actively used on the remote host.

Solution

Ensure that the KB3097966 security update has been installed and that the Microsoft automatic updater for revoked certificates is installed and running.

See Also

http://www.nessus.org/u?ef1a29d9

http://www.nessus.org/u?8ae31477

http://www.nessus.org/u?ae2600e6

http://www.nessus.org/u?a2f231b2

Plugin Details

Severity: Medium

ID: 86149

File Name: smb_kb3097966.nasl

Version: 1.14

Type: local

Agent: windows

Family: Windows

Published: 9/25/2015

Updated: 2/28/2022

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Reported from vendor

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: manual

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: Settings/ParanoidReport, SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/ProductName

Patch Publication Date: 9/24/2015

Vulnerability Publication Date: 9/24/2015

Reference Information

MSKB: 3097966