MS06-031: Vulnerability in RPC Mutual Authentication Could Allow Spoofing (917736)

medium Nessus Plugin ID 21693

Synopsis

It is possible to spoof an RPC server.

Description

The remote version of Windows contains a version of SMB (Server Message Block) protocol that is vulnerable to a spoofing attack.

An attacker may exploit these flaws to enduce a user to connect to a malicious RPC server.

Solution

Microsoft has released a set of patches for Windows 2000.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-031

Plugin Details

Severity: Medium

ID: 21693

File Name: smb_nt_ms06-031.nasl

Version: 1.28

Type: local

Agent: windows

Published: 6/13/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 6/13/2006

Vulnerability Publication Date: 6/13/2006

Reference Information

CVE: CVE-2006-2380

BID: 18389

CWE: 287

MSFT: MS06-031

MSKB: 917736