MS14-016: Vulnerability in Security Account Manager Remote (SAMR) Protocol Could Allow Security Feature Bypass (2934418)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host is affected by a security feature bypass

Description :

A security feature bypass vulnerability exists in Windows due to the
Security Account Manager Remote (SAMR) protocol incorrectly validating
the user lockout state. Remote, authenticated attackers can exploit
this issue to conduct brute force attacks against user passwords.

Note that the host must have network connectivity to a domain

See also :

Solution :

Microsoft has released a set of patches for Windows 2003, XP, Vista,
2008, 2008 R2, 2012, 2012 R2, and Server Core installation option.

Risk factor :

Medium / CVSS Base Score : 5.4
CVSS Temporal Score : 4.7
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 72935 ()

Bugtraq ID: 66012

CVE ID: CVE-2014-0317

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now