CERT-In Vulnerability Note
CIVN-2014-0231
Microsoft Windows Message Queuing Service Privilege Escalation Vulnerability
Original Issue Date:October 15, 2014
Severity Rating: MEDIUM
Systems Affected
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with Service Pack 2 for Itanium-based systems
Overview
A vulnerability has been reported in Microsoft Windows Message Queuing (MSMQ) service which could allow an attacker to gain elevated privileges on the targeted system.
Description
The vulnerability is due to improper handling of objects in memory by MSMQ service. A local attacker could exploit the vulnerability by sending a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation could allow a local attacker to gain elevated privileges.
Note: Successful exploitation requires that the Message Queuing component is installed (not installed by default) and enabled.
Workaround
- Disable the Message Queuing Service
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS14-062
Vendor Information
Microsoft
https://technet.microsoft.com/library/security/ms14-062
References
Microsoft
https://technet.microsoft.com/library/security/ms14-062
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=35977
SecurityTracker
http://securitytracker.com/id/1031025
CVE Name
CVE-2014-4971
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|