Korean
<< Back
VID 26617
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (MS12-049, 2655992) for 'Vulnerabilities in TLS Could Allow Information Disclosure' has not been applied.
The Transport Layer Security (TLS) Handshake Protocol is responsible for the authentication and key exchange necessary to establish or resume secure sessions.
A design flaw in the CBC mode of operation on the TLS protocol can allow encrypted TLS traffic to be decrypted. This vulnerability could allow for the decryption of HTTPS traffic by an unauthorized third party.
The update modifies the way that the Windows Secure Channel (SChannel) and the Cryptography API: Next Generation (CNG) components handle encrypted network packets.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://technet.microsoft.com/en-us/security/bulletin/ms12-049

* Platforms Affected:
Windows XP SP3
Windows Server 2003 SP2
Windows Server 2003 x64 SP2
Windows Server 2003 for Itanium-based
Windows Vista SP2
Windows Vista x64 SP2
Windows Server 2008 SP2
Windows Server x64 2008 SP2
Windows Server 2008 for Itanium-based
Windows 7 and SP1
Windows 7 x64 and SP2
Windows Server 2008 R2 x64
Windows Server 2008 R2 for Itanium-based
Recommendation Apply the appropriate patch (2655992) for your system, as listed in Microsoft Security Bulletin MS12-049 at http://technet.microsoft.com/en-us/security/bulletin/ms12-049
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2012-1870 (CVE)
Related URL 54304 (SecurityFocus)
Related URL (ISS)