Vigil@nce - Windows: privilege escalation via Netlogon
September 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use the Netlogon service of Windows, in order to
escalate his privileges.
– Impacted products: Windows 2003, Windows 2008 R0, Windows 2008 R2,
Microsoft Windows 2012.
– Severity: 2/4.
– Creation date: 15/07/2015.
DESCRIPTION OF THE VULNERABILITY
The Netlogon service of Windows authenticates users on the domain,
by connecting to a PDC (Primary Domain Controller).
However, an attacker can spoof the identity of a BDC (Backup
Domain Controller), to then capture users’ passwords.
An attacker can therefore use the Netlogon service of Windows, in
order to escalate his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-privilege-escalation-via-Netlogon-17361