Korean
<< Back
VID 26738
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS15-121, 3081320) for 'Security Update for Schannel to Address Spoofing' has not been applied.
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker performs a man-in-the-middle (MiTM) attack between a client and a legitimate server.

Schannel TLS Triple Handshake Vulnerability - CVE-2015-6112
A spoofing vulnerability exists in Microsoft Windows that is caused by a weakness in all supported versions of the TLS protocol. An attacker who successfully exploited this vulnerability could impersonate a victim on any other server that uses the same credentials as those used between the client and server where the attack is initiated.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/library/security/ms15-121

* Platforms Affected:
Windows Vista SP2
Windows Vista x64 SP2
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows 7 SP1
Windows 7 x64 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Recommendation Apply the appropriate patch(3081320) for your system, as listed in Microsoft Security Bulletin MS15-121 at https://technet.microsoft.com/en-us/library/security/ms15-121
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2015-6112 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)