Korean
<< Back
VID 26687
Severity 20
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS15-006, 3004365) for 'Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass' has not been applied.
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass by unintentionally relaxing the firewall policy and/or configuration of certain services when an attacker on the same network as the victim spoofs responses to DNS and LDAP traffic initiated by the victim.

- NLA Security Feature Bypass Vulnerability (CVE-2015-0006)
A security feature bypass vulnerability exists in the Network Location Awareness (NLA) service that could unintentionally relax the firewall policy and/or configuration of certain services. This could increase the surface exposed to an attacker. The vulnerability is caused when the NLA service fails to properly validate whether a domain-connected computer is connected to the domain or to an untrusted network. The update addresses the vulnerability by forcing mutual authentication via Kerberos.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/library/security/ms15-006

* Platforms Affected:
Windows 8
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Recommendation Apply the appropriate patch(3004365) for your system, as listed in Microsoft Security Bulletin MS15-006 at https://technet.microsoft.com/en-us/library/security/ms15-006
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2015-0001 (CVE)
Related URL 71927 (SecurityFocus)
Related URL (ISS)