SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Microsoft Input Method Editor (Japanese) Sandbox Bypass Flaw Lets Remote Users Gain Elevated Privileges
SecurityTracker Alert ID:  1031196
SecurityTracker URL:  http://securitytracker.com/id/1031196
CVE Reference:   CVE-2014-4077   (Links to External Site)
Date:  Nov 11 2014
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1; and prior service packs
Description:   A vulnerability was reported in Microsoft Input Method Editor (IME) (Japanese). A remote user can bypass sandbox restrictions to gain elevated privileges.

A remote user can create a specially crafted file that, when loaded by the target user, will bypass the application sandbox and gain elevated privileges.

Vitaly Kamluk and Costin Raiu of Kaspersky Lab reported this vulnerability.

Impact:   A remote user can create a file that, when loaded by the target user, will bypass sandbox restrictions to gain elevated privileges.
Solution:   The vendor has issued the following fixes:

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=60F6E89A-AE1E-48DA-B107-DF950DD75A19

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=95626C20-410B-4CD0-95C5-D0C7EBF98557

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=E884F424-E780-46DC-A10E-8E5E5B9D32F0

Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=59091f0d-6457-4c5f-851a-e91220dddd42

Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=513de964-c1bb-4ab7-af49-7dc06f1a6c04

Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=833b16a9-f694-4e3e-b970-62baf8ea0bfd

Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=fce58908-5682-42c6-b530-67dc689d7195

Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=e45928fa-ef99-4094-9b69-95e50ce8d67a

Windows 7 for 32-bit Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=8b9edfa6-0d4e-4e04-ba51-7d648a3e5f61

Windows 7 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=c99b75a5-d25d-481e-b419-bdfe9ab64b5e

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=643f0bdb-fd54-4870-a54d-0d0c3fe8bb9d

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=57fa96b9-018e-4b0b-a6b0-e3a5ce012d7f

Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=833b16a9-f694-4e3e-b970-62baf8ea0bfd

Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=fce58908-5682-42c6-b530-67dc689d7195

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=643f0bdb-fd54-4870-a54d-0d0c3fe8bb9d

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms14-078

Vendor URL:  technet.microsoft.com/library/security/ms14-078 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC