Vulnerability Name: | CCN-536 | ||||||
Published: | 1997-04-01 | ||||||
Updated: | 1997-04-01 | ||||||
Summary: | Windows NT could allow an attacker to obtain sensitive information. It provides a list of usernames, full names, descriptions, and group memberships to a remote server running as a domain controller. This information could be used by an attacker in a brute force attack. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: Microsoft FTP site Windows NT 3.51 sec-fix patch Source: CCN Type: Fyodor's Exploit World Narf NT usernames from an untrusted NT Domain Controller Source: CCN Type: Microsoft Product Support Services Windows NT Service Packs Source: CCN Type: NTBugTraq Mailing List, Sat, 19 Apr 1997 20:21:55 -0400 NT User List Exploit Source: XF Type: UNKNOWN nt-domain(536) Source: CCN Type: Microsoft Knowledge Base Article 143474 Restricting Information Available to Anonymous Logon Users Source: CCN Type: Microsoft Knowledge Base Article 272726 XADM: Administrators Are Able to Browse User List of Untrusted Domains | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |