Executive Summary

Summary
Title Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)
Informations
Name MS14-068 First vendor Publication 2014-11-18
Vendor Microsoft Last vendor Modification 2014-11-18
Severity (Vendor) Critical Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.0 (November 18, 2014): Bulletin published
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When this security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-068

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28191
 
Oval ID: oval:org.mitre.oval:def:28191
Title: Kerberos checksum vulnerability - CVE-2014-6324 (MS14-068)
Description: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-6324
Version: 3
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1
Os 1
Os 2
Os 2
Os 1

ExploitDB Exploits

id Description
2014-12-05 Windows Kerberos - Elevation of Privilege (MS14-068)

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-11-20 IAVM : 2014-A-0180 - Microsoft Windows Kerberos Privilege Escalation Vulnerability
Severity : Category I - VMSKEY : V0057571

Snort® IPS/IDS

Date Description
2016-03-14 Microsoft Windows Kerberos privilege escalation attempt
RuleID : 36596 - Revision : 4 - Type : OS-WINDOWS
2015-08-14 Microsoft Windows Kerberos privilege escalation attempt
RuleID : 35118 - Revision : 5 - Type : OS-WINDOWS

Metasploit Database

id Description
2014-11-18 MS14-068 Microsoft Kerberos Checksum Validation Vulnerability

Nessus® Vulnerability Scanner

Date Description
2014-11-18 Name : The remote implementation of Kerberos KDC is affected by a privilege escalati...
File : smb_nt_ms14-068.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2020-05-23 13:17:15
  • Multiple Updates
2016-04-27 04:53:41
  • Multiple Updates
2015-10-18 17:26:22
  • Multiple Updates
2015-08-14 21:23:53
  • Multiple Updates
2014-12-30 09:24:11
  • Multiple Updates
2014-12-07 09:25:12
  • Multiple Updates
2014-11-19 21:33:59
  • Multiple Updates
2014-11-19 13:25:20
  • Multiple Updates
2014-11-19 05:42:26
  • Multiple Updates
2014-11-18 21:30:22
  • Multiple Updates
2014-11-18 21:16:36
  • First insertion