The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."
2015-03-11T10:59:00.087
2025-04-12T10:46:40.837
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:A/AC:M/Au:N/C:P/I:P/A:N
5.5
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2003_server | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |