CERT-In Vulnerability Note
CIVN-2014-0251
Microsoft Windows TCP/IP Memory Object Handling Privilege Escalation Vulnerability
Original Issue Date:November 12, 2014
Severity Rating: HIGH
Systems Affected
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 SP2 for Itanium-based Systems
Overview
A privilege elevation vulnerability has been reported in the TCP/IP processing component of Microsoft Windows which could allow an attacker to gain elevated privilege.
Description
A privilege elevation exists in Microsoft Windows TCP/IP stack due to improper handling of the memory objects during the input/output control processing (IOCTL). A local attacker could exploit this vulnerability by logging on to the targeted system and executing specially crafted application to send malicious TCP/IP requests.
Successful exploitation of the vulnerability by the attacker could allow them to gain elevated privileges. If the target process runs with the administrator privileges, the attacker may also be able to execute arbitrary code, install malicious programs, view, modify, or erase data; or create new accounts with complete admin rights.
Solution
Apply appropriate patch/update as mentioned in Microsoft Security Bulletin
MS14-070
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms14-070
References
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=36255
NVD
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4076
CVE Name
CVE-2014-4076
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|