Alert (TA14-323A) Microsoft Windows Kerberos KDC Remote Privilege Escalation Vulnerability

Latest alert from

 

NCCIC / US-CERT

Systems Affected

  • Microsoft Windows Vista, 7, 8, and 8.1
  • Microsoft Server 2003, Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2

Overview

A remote escalation of privilege vulnerability exists in implementations of Kerberos Key Distribution Center (KDC) in Microsoft Windows which could allow a remote attacker to take control of a vulnerable system. [1(link is external)]

Description

The Microsoft Windows Kerberos KDC fails to properly check service tickets for valid signatures, which can allow aspects of the service ticket to be forged. The improper check allows an attacker to escalate valid domain user account privileges to those of a domain administrator account, which renders the entire domain vulnerable to compromise.

At the time this release was issued, Microsoft was aware of limited, targeted attacks attempting to exploit this vulnerability.

Impact

A valid domain user can pass invalid domain administrator credentials, gain access and compromise any system on the domain, including the domain controller. [2]

Solution

An update is available from Microsoft. Please see Microsoft Security Bulletin MS14-068 and Microsoft Research Security and Defense Blog for more details, and apply the necessary updates.[1(link is external)3(link is external)]

References

Revisions

  • November 19, 2014: Initial Draft

 

This entry was posted in Security Alerts. Bookmark the permalink.

3 Responses to Alert (TA14-323A) Microsoft Windows Kerberos KDC Remote Privilege Escalation Vulnerability

  1. Olin Mannarino says:

    With thanks! Valuable information!

  2. Annette Whiton says:

    I conceive this web site has got some real good information for everyone

  3. Hallo There’s certainly a great deal to learn about this topic. I really like all the points you’ve made. thanks

Comments are closed.