Executive Summary

Summary
TitleVulnerabilities in Windows Kernel
Informations
NameMS14-015First vendor Publication2014-03-11
VendorMicrosoftLast vendor Modification2014-03-11
Severity (Vendor) ImportantRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.0 (March 11, 2014): Bulletin published.

Summary: This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms14-015

CWE : Common Weakness Enumeration

%idName
50 %CWE-264Permissions, Privileges, and Access Controls
50 %CWE-200Information Exposure

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22633
 
Oval ID: oval:org.mitre.oval:def:22633
Title: Win32k Information Disclosure Vulnerability - CVE-2014-0323 (MS14-015)
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (system hang) via a crafted application, aka "Win32k Information Disclosure Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-0323
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21700
 
Oval ID: oval:org.mitre.oval:def:21700
Title: Win32k Elevation of Privilege Vulnerability - CVE-2014-0300 (MS14-015)
Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-0300
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1
Os1
Os1
Os1
Os1
Os3
Os2
Os1
Os2

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-03-13IAVM : 2014-A-0041 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver
Severity : Category I - VMSKEY : V0046299

Nessus® Vulnerability Scanner

DateDescription
2014-03-11Name : The Windows kernel drivers on the remote host are affected by multiple vulner...
File : smb_nt_ms14-015.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2014-03-17 17:19:02
  • Multiple Updates
2014-03-13 13:31:09
  • Multiple Updates
2014-03-12 13:26:34
  • Multiple Updates
2014-03-12 13:21:33
  • Multiple Updates
2014-03-11 21:20:18
  • First insertion