ID CVE-2015-2476
Summary The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "WebDAV Client Information Disclosure Vulnerability."
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_7:-:sp1:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_7:-:sp1:-:-:-:-:x64
  • cpe:2.3:o:microsoft:windows_7:-:sp1:-:-:-:-:x86
    cpe:2.3:o:microsoft:windows_7:-:sp1:-:-:-:-:x86
  • cpe:2.3:o:microsoft:windows_8:-:-:-:-:-:-:x64
    cpe:2.3:o:microsoft:windows_8:-:-:-:-:-:-:x64
  • cpe:2.3:o:microsoft:windows_8:-:-:-:-:-:-:x86
    cpe:2.3:o:microsoft:windows_8:-:-:-:-:-:-:x86
  • Microsoft Windows 8.1 x64 (64-bit)
    cpe:2.3:o:microsoft:windows_8.1:-:-:-:-:-:-:x64
  • Microsoft Windows 8.1 x86 (32-bit)
    cpe:2.3:o:microsoft:windows_8.1:-:-:-:-:-:-:x86
  • Microsoft Windows RT
    cpe:2.3:o:microsoft:windows_rt
  • Microsoft Windows RT Gold
    cpe:2.3:o:microsoft:windows_rt:-:gold
  • Microsoft Windows RT 8.1
    cpe:2.3:o:microsoft:windows_rt_8.1
  • Microsoft Windows Server 2008 Service Pack 2
    cpe:2.3:o:microsoft:windows_server_2008:-:sp2
  • Microsoft Windows Server 2008 R2 Service Pack 1
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1
  • Microsoft Windows Server 2012 Gold
    cpe:2.3:o:microsoft:windows_server_2012:-:gold
  • Microsoft Windows Server 2012 R2 DataCenter Edition
    cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:-:datacenter
  • Microsoft Windows Server 2012 R2 Essentials Edition
    cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:-:essentials
  • Microsoft Windows Server 2012 R2 Standard Edition
    cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:-:standard
CVSS
Base: 2.6 (as of 17-08-2015 - 14:49)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
msbulletin via4
bulletin_id MS15-089
bulletin_url
date 2015-08-11T00:00:00
impact Information Disclosure
knowledgebase_id 3076949
knowledgebase_url
severity Important
title Vulnerability in WebDAV Could Allow Information Disclosure
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS15-089.NASL
description The remote Windows host is affected by an information disclosure vulnerability in the Microsoft Web Distributed Authoring and Versioning (WebDAV) client due to explicitly allowing the use of Secure Socket Layer (SSL) 2.0. A remote attacker can exploit this to force an encrypted SSL 2.0 session with a WebDAV server that has SSL 2.0 enabled, and use a man-in-the-middle attack to decrypt portions of the encrypted traffic, resulting in the disclosure of sensitive information.
last seen 2019-02-21
modified 2018-11-15
plugin id 85323
published 2015-08-11
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=85323
title MS15-089: Vulnerability in WebDAV Could Allow Information Disclosure (3076949)
refmap via4
ms MS15-089
sectrack 1033249
Last major update 23-12-2016 - 21:59
Published 14-08-2015 - 20:59
Last modified 12-10-2018 - 18:09
Back to Top