{"id":110,"date":"2014-11-19T17:00:39","date_gmt":"2014-11-19T17:00:39","guid":{"rendered":"http:\/\/test.blueshell.im\/Blog\/?p=110"},"modified":"2020-08-16T08:44:37","modified_gmt":"2020-08-16T08:44:37","slug":"alert-ta14-323a-microsoft-windows-kerberos-kdc-remote-privilege-escalation-vulnerability","status":"publish","type":"post","link":"http:\/\/www.blueshell.im\/Blog\/?p=110","title":{"rendered":"Alert (TA14-323A) Microsoft Windows Kerberos KDC Remote Privilege Escalation Vulnerability"},"content":{"rendered":"<h3>Latest alert from<\/h3>\n<p>&nbsp;<\/p>\n<table border=\"0\" width=\"700\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" src=\"https:\/\/public.govdelivery.com\/system\/images\/37745\/original\/BANNER_NCCIC_USC_01.png\" alt=\"NCCIC \/ US-CERT\" width=\"700\" height=\"100\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Systems Affected<\/h3>\n<div class=\"field field-name-field-alert-systems-affected field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<ul>\n<li>Microsoft Windows Vista, 7, 8, and 8.1<\/li>\n<li>Microsoft Server 2003, Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h3>Overview<\/h3>\n<div class=\"field field-name-field-alert-overview field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>A remote escalation of privilege vulnerability exists in implementations of Kerberos Key Distribution Center (KDC) in Microsoft Windows which could allow a remote attacker to take control of a vulnerable system. [<a class=\"ext\" href=\"http:\/\/1.\thttps:\/\/technet.microsoft.com\/library\/security\/MS14-068\">1<span class=\"ext\"><span class=\"element-invisible\">(link is external)<\/span><\/span><\/a>]<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3>Description<\/h3>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>The Microsoft Windows Kerberos KDC fails to properly check service tickets for valid signatures, which can allow aspects of the service ticket to be forged. The improper check allows an attacker to escalate valid domain user account privileges to those of a domain administrator account, which renders the entire domain vulnerable to compromise.<\/p>\n<p>At the time this release was issued, Microsoft was aware of limited, targeted attacks attempting to exploit this vulnerability.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3>Impact<\/h3>\n<div class=\"field field-name-field-alert-impact field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>A valid domain user can pass invalid domain administrator credentials, gain access and compromise any system on the domain, including the domain controller. [<a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/213119\">2<\/a>]<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3>Solution<\/h3>\n<div class=\"field field-name-field-alert-solution field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>An update is available from Microsoft. Please see Microsoft Security Bulletin MS14-068 and Microsoft Research Security and Defense Blog for more details, and apply the necessary updates.[<a class=\"ext\" href=\"http:\/\/technet.microsoft.com\/library\/security\/MS14-068\">1<span class=\"ext\"><span class=\"element-invisible\">(link is external)<\/span><\/span><\/a>,&nbsp;<a class=\"ext\" href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\">3<span class=\"ext\"><span class=\"element-invisible\">(link is external)<\/span><\/span><\/a>]<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3>References<\/h3>\n<div class=\"field field-name-field-alert-references field-type-link-field field-label-hidden clearfix\">\n<ul class=\"field-items\">\n<li class=\"field-item even\"><a class=\"ext\" href=\"https:\/\/technet.microsoft.com\/library\/security\/MS14-068\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Bulletin MS14-068&nbsp;<span class=\"ext\"><span class=\"element-invisible\">(link is external)<\/span><\/span><\/a><\/li>\n<li class=\"field-item odd\"><a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/213119\" target=\"_blank\" rel=\"noopener noreferrer\">Vulnerability Note VU#213119<\/a><\/li>\n<li class=\"field-item even\"><a class=\"ext\" href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Research and Defense Blog<span class=\"ext\"><span class=\"element-invisible\">(link is external)<\/span><\/span><\/a><\/li>\n<\/ul>\n<\/div>\n<h3>Revisions<\/h3>\n<div class=\"field field-name-field-alert-revision-history field-type-text field-label-hidden clearfix\">\n<ul class=\"field-items\">\n<li class=\"field-item even\">November 19, 2014: Initial Draft<\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Latest alert from &nbsp; Systems Affected Microsoft Windows Vista, 7, 8, and 8.1 Microsoft Server 2003, Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2 Overview A remote escalation of privilege vulnerability exists in implementations of Kerberos Key &hellip; <a href=\"http:\/\/www.blueshell.im\/Blog\/?p=110\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":47,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/110"}],"collection":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=110"}],"version-history":[{"count":3,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/110\/revisions"}],"predecessor-version":[{"id":523,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/110\/revisions\/523"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/media\/47"}],"wp:attachment":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=110"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}