Executive Summary

Summary
TitleVulnerability in Kerberos Could Allow Elevation of Privilege (3011780)
Informations
NameMS14-068First vendor Publication2014-11-18
VendorMicrosoftLast vendor Modification2014-11-18
Severity (Vendor) CriticalRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score9Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.0 (November 18, 2014): Bulletin published
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-068

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28191
 
Oval ID: oval:org.mitre.oval:def:28191
Title: Kerberos checksum vulnerability - CVE-2014-6324 (MS14-068)
Description: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-6324
Version: 3
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1
Os1
Os1
Os2
Os2
Os1

ExploitDB Exploits

idDescription
2014-12-05Windows Kerberos - Elevation of Privilege (MS14-068)

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-11-20IAVM : 2014-A-0180 - Microsoft Windows Kerberos Privilege Escalation Vulnerability
Severity : Category I - VMSKEY : V0057571

Snort® IPS/IDS

DateDescription
2016-03-14Microsoft Windows Kerberos privilege escalation attempt
RuleID : 36596 - Revision : 4 - Type : OS-WINDOWS
2015-08-14Microsoft Windows Kerberos privilege escalation attempt
RuleID : 35118 - Revision : 5 - Type : OS-WINDOWS

Metasploit Database

idDescription
2014-11-18 MS14-068 Microsoft Kerberos Checksum Validation Vulnerability

Nessus® Vulnerability Scanner

DateDescription
2014-11-18Name : The remote implementation of Kerberos KDC is affected by a privilege escalati...
File : smb_nt_ms14-068.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2016-04-27 04:53:41
  • Multiple Updates
2015-10-18 17:26:22
  • Multiple Updates
2015-08-14 21:23:53
  • Multiple Updates
2014-12-30 09:24:11
  • Multiple Updates
2014-12-07 09:25:12
  • Multiple Updates
2014-11-19 21:33:59
  • Multiple Updates
2014-11-19 13:25:20
  • Multiple Updates
2014-11-19 05:42:26
  • Multiple Updates
2014-11-18 21:30:22
  • Multiple Updates
2014-11-18 21:16:36
  • First insertion