Executive Summary

Summary
TitleSecurity Update for Schannel to Address Spoofing (3081320)
Informations
NameMS15-121First vendor Publication2015-11-10
VendorMicrosoftLast vendor Modification2016-04-07
Severity (Vendor) ImportantRevision1.1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:N)
Cvss Base Score5.8Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker performs a man-in-the-middle (MiTM) attack between a client and a legitimate server.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-121

CWE : Common Weakness Enumeration

%idName
50 %CWE-310Cryptographic Issues
50 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1
Os1
Os1
Os1
Os3
Os2
Os1

Nessus® Vulnerability Scanner

DateDescription
2015-11-10Name : The remote Windows host is affected by a spoofing vulnerability.
File : smb_nt_ms15-121.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
DateInformations
2016-12-07 21:26:49
  • Multiple Updates
2016-04-08 00:27:31
  • Multiple Updates
2016-04-08 00:16:21
  • Multiple Updates
2015-11-13 00:27:35
  • Multiple Updates
2015-11-11 17:27:45
  • Multiple Updates
2015-11-11 13:26:05
  • Multiple Updates
2015-11-10 21:28:09
  • Multiple Updates
2015-11-10 21:16:20
  • First insertion