Executive Summary

Summary
TitleVulnerability in TCP/IP Could Allow Elevation of Privilege (2989935)
Informations
NameMS14-070First vendor Publication2014-11-11
VendorMicrosoftLast vendor Modification2014-11-11
Severity (Vendor) ImportantRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (November 11, 2014): Bulletin published.
Summary: This security update resolves a publically reported vulnerability in TCP/IP that occurs during input/output control (IOCTL) processing. This vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another process. If this process runs with administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-070

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:27620
 
Oval ID: oval:org.mitre.oval:def:27620
Title: TCP/IP Elevation of privilege vulnerability - CVE-2014-4076 (MS14-070)
Description: Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-4076
Version: 3
Platform(s): Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os3

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-11-13IAVM : 2014-A-0174 - Microsoft TCP/IP Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0057385

Snort® IPS/IDS

DateDescription
2014-12-11Microsoft Windows tcpip.sys null pointer dereference attempt
RuleID : 32490 - Revision : 3 - Type : OS-WINDOWS
2014-12-11Microsoft Windows tcpip.sys null pointer dereference attempt
RuleID : 32489 - Revision : 3 - Type : OS-WINDOWS

Metasploit Database

idDescription
2014-11-11 MS14-070 Windows tcpip!SetAddrOptions NULL Pointer Dereference

Nessus® Vulnerability Scanner

DateDescription
2014-11-12Name : The remote Windows host is affected by an elevation of privilege vulnerability.
File : smb_nt_ms14-070.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
DateInformations
2015-10-18 17:26:23
  • Multiple Updates
2015-02-12 17:21:56
  • Multiple Updates
2014-12-11 21:23:34
  • Multiple Updates
2014-11-12 17:27:17
  • Multiple Updates
2014-11-12 13:27:28
  • Multiple Updates
2014-11-12 05:34:50
  • Multiple Updates
2014-11-11 21:28:11
  • Multiple Updates
2014-11-11 21:16:46
  • First insertion