SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   Microsoft
Microsoft Windows Kerberos KDC Signature Validation Flaw Lets Remote Authenticated Users
SecurityTracker Alert ID:  1031237
SecurityTracker URL:  http://securitytracker.com/id/1031237
CVE Reference:   CVE-2014-6324   (Links to External Site)
Date:  Nov 19 2014
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Microsoft Windows Kerberos. A remote authenticated user can gain elevated privileges.

The Microsoft Kerberos KDC implementation does not properly validate signatures. A remote authenticated unprivileged domain user can exploit this flaw to forge portions of a Kerberos service ticket and gain domain administrator privileges.

This vulnerability is being actively exploited in limited situations. The vendor reports that the known active attacks do not affect Windows Server 2012 and Windows Server 2012 R2.

The Qualcomm Information Security and Risk Management team, including Tom Maddock, reported this vulnerability.

Impact:   A remote authenticated user can gain domain administrator privileges.
Solution:   The vendor has issued the following fixes:

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=c7d1dcfa-8ddc-4ddf-b5e2-1cba27248c04

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=c1a4e5eb-a4dd-48a9-9e1d-3c4d59927b1d

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=aeb32c73-b60e-4c13-ad18-91ceff8a709d

Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=8fff386a-7240-466e-81c7-d16402e45d68

Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=a68503ed-60ea-4eda-9472-66507747fc33

Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=e9f596c3-8e54-43e6-833e-40ba1ba1a237

Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=946432d6-4fa8-4d86-9d8e-f45855534603

Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=3281a4dd-0f54-4846-8eeb-71ae4dcb1375

Windows 7 for 32-bit Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=545cd268-2f52-4da3-a145-dc242f3505b2

Windows 7 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=86972a2d-8243-446b-a6d8-577705ce8bd3

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=67c76c2d-d9df-47fd-804a-730b289e9ba0

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=51718d79-2a17-4aff-82ef-7f8e7bbdd080

Windows 8 for 32-bit Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=61fcecc8-cda6-4da1-8a54-6207ee047dfa

Windows 8 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=a3fecf88-d08a-429f-b1c3-f2f8fabe79e6

Windows 8.1 for 32-bit Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=cc675a6e-7eb2-4f9d-9a91-b17f93c5398d

Windows 8.1 for x64-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=0c76a0b5-ef02-48fb-9af5-3d1f65240d2d

Windows Server 2012:

http://www.microsoft.com/downloads/details.aspx?familyid=e35fb776-30ad-4fc9-9918-1f27fca45c9d

Windows Server 2012 R2:

http://www.microsoft.com/downloads/details.aspx?familyid=02400d4e-4c9e-41e8-9f89-2568420db900

Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=e9f596c3-8e54-43e6-833e-40ba1ba1a237

Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=946432d6-4fa8-4d86-9d8e-f45855534603

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=67c76c2d-d9df-47fd-804a-730b289e9ba0

Windows Server 2012:

http://www.microsoft.com/downloads/details.aspx?familyid=e35fb776-30ad-4fc9-9918-1f27fca45c9d

Windows Server 2012 R2:

http://www.microsoft.com/downloads/details.aspx?familyid=02400d4e-4c9e-41e8-9f89-2568420db900

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms14-068

Vendor URL:  technet.microsoft.com/library/security/ms14-068 (Links to External Site)
Cause:   Authentication error
Underlying OS:  Windows (2008), Windows (2012), Windows (7), Windows (8), Windows (Vista)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 26 2015 (HP Issues Fix for HP LoadRunner) Microsoft Windows Kerberos KDC Signature Validation Flaw Lets Remote Authenticated Users
HP has issued a fix for HP LoadRunner.
Jan 26 2015 (HP Issues Fix for HP Performance Center) Microsoft Windows Kerberos KDC Signature Validation Flaw Lets Remote Authenticated Users
HP has issued a fix for HP Performance Center.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC