An
elevation of privilege vulnerability exists in the Security Account
Manager (SAM) and Local Security Authority (Domain Policy) (LSAD)
remote protocols. Microsoft and SAMBA are vulnerable to these
attacks. The vulnerability is triggered when these protocols accept
authentication levels that do not protect them adequately. It is
caused by the way the SAM and LSAD remote protocols establish the
Remote Procedure Call (RPC) channel. An attacker who successfully
exploited this vulnerability could gain access to the SAM database.
To exploit the vulnerability, an attacker could launch a
man-in-the-middle (MiTM) attack, force a downgrade of the
authentication level of the SAM and LSAD channels, and then
impersonate an authenticated user. The attacker can access domain
passwords as well. The security update addresses the vulnerability by
modifying how the SAM and LSAD remote protocols handle authentication
levels.
There
are two different CVE identifiers associated with this vulnerability:
-
Microsoft: CVE-2016-0128
-
SAMBA: CVE-2016-2118
In
addition to this, the vulnerability has been known by 'badlock'.
Microsoft
has two protocols that are vulnerable to this attack:
-
Security Account Manager Remote Protocol(SAMR): This protocol provides management functionality for user account store and for user/group directries.
-
Local Security Authority (LSAD): This protocol provides management functionality for user account store and for user/group directries.
These
protocols manintain security account manager database. They are
supported by both Windows and Samba and they support all domain
profiles.
In addition to these, SAMBA's following protocols are susceptible to this vulnerability:
In addition to these, SAMBA's following protocols are susceptible to this vulnerability:
-
Directory Replication Service Remote Protocol (DRSR): RPC protocol for replication and management of data in Active Directory
-
BackupKey Remote Protocol (BKRP): Encrypts and decrypts sensitive data (such as cryptographic keys)
Please
patch your security systems (Gateway or Endpoint) to the latest one
to prevent from this vulnerability.
More
details can be read at
https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=918
Have
a good time.
(Be
knowledgeable, pass it on then)
Comments
Post a Comment