LSASS SMB NTLM Exchange Remote Memory Corruption

Discussion in 'News Aggregator' started by Packet Storm, 15 Nov 2016.

  1. Packet Storm

    Packet Storm Guest

    A vulnerability in Windows Local Security Authority Subsystem Service (LSASS) was found on Windows OS versions ranging from Windows XP through to Windows 10. This vulnerability allows an attacker to remotely crash the LSASS.EXE process of an affected workstation with no user interaction. Successful remote exploitation of this issue will result in a reboot of the target machine. Local privilege escalation should also be considered likely. Microsoft acknowledged the vulnerability and has published an advisory (MS16-137) and a patch, resolving this issue.

    Continue reading...
     

Share This Page

Loading...