Vulnerability Name: | CCN-3276 | ||||||
Published: | 1999-10-01 | ||||||
Updated: | 1999-10-01 | ||||||
Summary: | An anonymous connection to a Primary Domain Controller (PDC), when a Backup Domain Controller (BDC) has just been added to the domain, can be used to obtain the entire SAM database, including all users' passwords.
Analysis of SAM database synchronization between PDCs and BDCs shows that if one password hash in the sync is known, or is weak enough to be cracked, then all other password hashes in the sync can be decoded. LM and NT password hashes are 16 bytes, and are cleartext equivalent. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: XF Type: UNKNOWN msrpc-netlogon-samsync(3276) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |