The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3548-1 samba security update
EUVD EUVD EUVD-2015-0043 The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00999}

epss

{'score': 0.01085}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-06T03:55:27.562Z

Reserved: 2014-11-18T00:00:00

Link: CVE-2015-0005

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-03-11T10:59:00.087

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-0005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.