CVE-2020-1472

Name
CVE-2020-1472
Description
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472
Third Party Advisory http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html
Third Party Advisory https://www.kb.cert.org/vuls/id/490028
Mailing List http://www.openwall.com/lists/oss-security/2020/09/17/2
Third Party Advisory https://usn.ubuntu.com/4510-1/
Third Party Advisory https://www.synology.com/security/advisory/Synology_SA_20_21
Third Party Advisory https://usn.ubuntu.com/4510-2/
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/
UBUNTU https://usn.ubuntu.com/4559-1/
MISC http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html
MLIST https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
GENTOO https://security.gentoo.org/glsa/202012-24
MISC https://www.oracle.com/security-alerts/cpuApr2021.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* windows_server_2008 == None == r2
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* windows_server_2012 == None == -
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* windows_server_2012 == None == r2
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* windows_server_2016 == None == -
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* windows_server_2016 == None == 1903
cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* windows_server_2016 == None == 1909
cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* windows_server_2016 == None == 2004
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* windows_server_2019 == None == -

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
samba 3.10-main 4.10.18-r0 Natanael Copa <ncopa@alpinelinux.org> fixed