First published: Tue Nov 11 2014(Updated: )
Microsoft Active Directory Federation Services (AD FS) 2.0, 2.1, and 3.0, when a configured SAML Relying Party lacks a sign-out endpoint, does not properly process logoff actions, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation, aka "Active Directory Federation Services Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Active Directory Federation Services | =2.1 | |
Microsoft Windows Server 2012 | ||
Microsoft Active Directory Federation Services | =2.0 | |
Microsoft Windows 2008 | =sp2 | |
Microsoft Windows 2008 | =sp2 | |
Microsoft Windows 2008 | =r2-sp2 | |
Microsoft Active Directory Federation Services | =3.0 | |
Microsoft Windows Server 2012 | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.