MS12-083: Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host is affected by a security feature bypass

Description :

A security feature bypass vulnerability exists in Windows due to the
way the IP-HTTPS Component handles certificates. The vulnerability
could allow security feature bypass if an attacker presents a revoked
certificate to an IP-HTTPS server commonly used in Microsoft
DirectAccess deployments. To exploit the vulnerability, the attacker
must use a certificate issued from the domain for IP-HTTPS server

Successful exploitation of this vulnerability could allow the attacker
to bypass certificate validation checks. Logging on to a system inside
the organization would still require system or domain credentials.

See also :

Solution :

Microsoft has released a set of patches for Windows 2008 R2 and 2012.

Risk factor :

Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 4.7
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 63230 ()

Bugtraq ID: 56840

CVE ID: CVE-2012-2549

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now