Executive Summary
Summary | |
---|---|
Title | Vulnerability in Microsoft Windows Kernel Could Allow Elevation of Privilege |
Informations | |||
---|---|---|---|
Name | KB2914486 | First vendor Publication | 2013-11-27 |
Vendor | Microsoft | Last vendor Modification | 1970-01-01 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft is investigating new reports of a vulnerability in a kernel component of Windows XP and Windows Server 2003. We are aware of limited, targeted attacks that attempt to exploit this vulnerability. Our investigation of this vulnerability has verified that it does not affect customers who are using operating systems newer than Windows XP and Windows Server 2003. The vulnerability is an elevation of privilege vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Microsoft is actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers. For information about protections released by MAPP partners, see MAPP Partners with Updated Protections. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs. Mitigating Factors: Recommendation. Please see the Suggested Actions section of this advisory for more information. For more information about this issue, see the following references: This advisory discusses the following software. What is the scope of the advisory? What causes the vulnerability? What is NDPROXY? What might an attacker use the vulnerability to do? How could an attacker exploit the vulnerability? Apply Workarounds Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. See the next section, Workarounds, for more information. Reroute the NDProxy service to Null.sys For environments with non-default, limited user privileges, Microsoft has verified that the following workaround effectively blocks the attacks that have been observed in the wild. To implement this workaround, follow these steps: Effects of this workaround Disabling NDProxy.sys will cause certain services that rely on Windows Telephony Application Programming Interfaces (TAPI) to not function. Services that will no longer work include Remote Access Service (RAS), dial-up networking, and virtual private networking (VPN). How to undo the workaround To undo this workaround, follow these steps: We continue to encourage customers to follow our Protect Your Computer guidance of enabling a firewall, getting software updates and installing antivirus software. For more information, see Microsoft Safety & Security Center. Users running Microsoft software should apply the latest Microsoft security updates to help make sure that their computers are as protected as possible. If you are not sure whether your software is up to date, visit Microsoft Update, scan your computer for available updates, and install any high-priority updates that are offered to you. If you have automatic updating enabled and configured to provide updates for Microsoft products, the updates are delivered to you when they are released, but you should verify that they are installed. |
Original Source
Url : http://www.microsoft.com/technet/security/advisory/2914486.mspx |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:22288 | |||
Oval ID: | oval:org.mitre.oval:def:22288 | ||
Title: | Kernel NDProxy Vulnerability (CVE-2013-5065) - MS14-002 | ||
Description: | NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-5065 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows XP | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 2 |
ExploitDB Exploits
id | Description |
---|---|
2013-12-17 | Microsoft Windows ndproxy.sys - Local Privilege Escalation |
2013-12-03 | Windows NDPROXY Local SYSTEM Privilege Escalation |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-01-16 | IAVM : 2014-A-0004 - Microsoft Windows Kernel Privilege Escalation Vulnerability Severity : Category II - VMSKEY : V0043405 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28872 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28871 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28870 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28869 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28868 - Revision : 5 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows NDProxy.sys privilege escalation attempt RuleID : 28867 - Revision : 5 - Type : OS-WINDOWS |
Metasploit Database
id | Description |
---|---|
2013-11-27 | MS14-002 Microsoft Windows ndproxy.sys Local Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-01-14 | Name : The Windows kernel on the remote host is affected by a privilege escalation v... File : smb_nt_ms14-002.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:11 |
|
2014-01-19 21:29:41 |
|
2014-01-16 13:22:10 |
|
2014-01-05 00:18:31 |
|
2014-01-03 17:19:07 |
|
2013-11-29 17:21:28 |
|
2013-11-28 13:21:48 |
|
2013-11-28 00:22:46 |
|