Executive Summary

Summary
TitleSecurity Update for NPS RADIUS Server to Address Denial of Service (3133043)
Informations
NameMS16-021First vendor Publication2016-02-09
VendorMicrosoftLast vendor Modification2016-02-09
Severity (Vendor) N/ARevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-021

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os2
Os4

Snort® IPS/IDS

DateDescription
2015-01-13Microsoft RADIUS Server invalid access-request username denial of service att...
RuleID : 33053 - Revision : 5 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

DateDescription
2016-02-09Name : The remote Windows host is affected by a denial of service vulnerability.
File : smb_nt_ms16-021.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2016-02-19 21:28:51
  • Multiple Updates
2016-02-17 21:30:31
  • Multiple Updates
2016-02-16 21:29:37
  • Multiple Updates
2016-02-10 17:29:12
  • Multiple Updates
2016-02-10 13:23:49
  • Multiple Updates
2016-02-09 21:30:22
  • Multiple Updates
2016-02-09 21:17:57
  • First insertion