Executive Summary
Summary | |
---|---|
Title | Microsoft Windows Kerberos Key Distribution Center (KDC) fails to properly validate Privilege Attribute Certificate (PAC) signature |
Informations | |||
---|---|---|---|
Name | VU#213119 | First vendor Publication | 2014-11-18 |
Vendor | VU-CERT | Last vendor Modification | 2014-11-19 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#213119Microsoft Windows Kerberos Key Distribution Center (KDC) fails to properly validate Privilege Attribute Certificate (PAC) signatureOverviewMicrosoft Windows Kerberos KDC contains a vulnerability allowing an authenticated unprivileged domain user to escalate privileges to a domain administrator account, allowing the user to compromise any computer on the domain. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditMicrosoft credits the Qualcomm Information Security & Risk Management team, with special recognition for Tom Maddock. This document was written by Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/213119 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28191 | |||
Oval ID: | oval:org.mitre.oval:def:28191 | ||
Title: | Kerberos checksum vulnerability - CVE-2014-6324 (MS14-068) | ||
Description: | The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-6324 | Version: | 3 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 3 | |
Os | 2 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-11-20 | IAVM : 2014-A-0180 - Microsoft Windows Kerberos Privilege Escalation Vulnerability Severity : Category I - VMSKEY : V0057571 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Microsoft Windows Kerberos privilege escalation attempt RuleID : 36596 - Revision : 4 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows Kerberos privilege escalation attempt RuleID : 35118 - Revision : 5 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-11-18 | Name : The remote implementation of Kerberos KDC is affected by a privilege escalati... File : smb_nt_ms14-068.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-11-21 13:25:16 |
|
2014-11-19 21:37:03 |
|
2014-11-19 21:21:55 |
|
2014-11-19 05:45:01 |
|
2014-11-19 00:21:28 |
|
2014-11-18 21:22:36 |
|