Korean
<< Back
VID 26706
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS15-052, 3050514) for 'Vulnerability in Windows Kernel Could Allow Security Feature Bypass' has not been applied.
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker logs on to an affected system and runs a specially crafted application.

- Windows Kernel Security Feature Bypass Vulnerability(CVE-2015-1674)
A security feature bypass vulnerability exists when the Windows kernel fails to properly validate a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability can then retrieve the base address of cng.sys from a compromised process.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/library/security/ms15-052

* Platforms Affected:
Windows 8
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Recommendation Apply the appropriate patch(3050514) for your system, as listed in Microsoft Security Bulletin MS15-052 at https://technet.microsoft.com/en-us/library/security/ms15-052
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2015-1674 (CVE)
Related URL 74488 (SecurityFocus)
Related URL (ISS)