{"id":115,"date":"2014-11-14T23:59:26","date_gmt":"2014-11-14T23:59:26","guid":{"rendered":"http:\/\/test.blueshell.im\/Blog\/?p=115"},"modified":"2020-08-16T08:45:09","modified_gmt":"2020-08-16T08:45:09","slug":"ta14-318a-microsoft-secure-channel-schannel-vulnerability-cve-2014-6321","status":"publish","type":"post","link":"http:\/\/www.blueshell.im\/Blog\/?p=115","title":{"rendered":"TA14-318A: Microsoft Secure Channel (Schannel) Vulnerability (CVE-2014-6321)"},"content":{"rendered":"<p class=\"\"><img loading=\"lazy\" class=\"\" src=\"https:\/\/public.govdelivery.com\/system\/images\/37745\/original\/BANNER_NCCIC_USC_01.png\" alt=\"NCCIC \/ US-CERT\" width=\"700\" height=\"100\"><\/p>\n<p class=\"\">National Cyber Awareness System:<\/p>\n<div class=\"rss_item\">\n<div class=\"rss_title\"><a class=\"\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-318A\">TA14-318A: Microsoft Secure Channel (Schannel) Vulnerability (CVE-2014-6321)<\/a><\/div>\n<div class=\"rss_pub_date\">11\/14\/2014 10:32 AM EST<\/div>\n<p>&nbsp;<\/p>\n<div class=\"rss_description\">Original release date: November 14, 2014<br class=\"\"><\/p>\n<h3 class=\"\">Systems Affected<\/h3>\n<ul class=\"\">\n<li class=\"\">Microsoft Windows Server 2003 SP2<\/li>\n<li class=\"\">Microsoft Windows Vista SP2<\/li>\n<li class=\"\">Microsoft Windows Server 2008 SP2<\/li>\n<li class=\"\">Microsoft Windows Server 2008 R2 SP1<\/li>\n<li class=\"\">Microsoft Windows 7 SP1<\/li>\n<li class=\"\">Microsoft Windows 8<\/li>\n<li class=\"\">Microsoft Windows 8.1<\/li>\n<li class=\"\">Microsoft Windows Server 2012<\/li>\n<li class=\"\">Microsoft Windows Server 2012 R2<\/li>\n<li class=\"\">Microsoft Windows RT<\/li>\n<li class=\"\">Microsoft Windows RT 8.1<\/li>\n<\/ul>\n<p class=\"\">Microsoft Windows XP and 2000 may also be affected.<\/p>\n<h3 class=\"\">Overview<\/h3>\n<p class=\"\">A critical vulnerability in Microsoft Windows systems could allow a remote attacker to execute arbitrary code via specially crafted network traffic.<a class=\"\" href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6321\">[1]<\/a><\/p>\n<h3 class=\"\">Description<\/h3>\n<p class=\"\">Microsoft Secure Channel (Schannel) is a security package that provides SSL and TLS on Microsoft Windows platforms.[<a class=\"\" href=\"https:\/\/technet.microsoft.com\/library\/security\/MS14-066\">2<\/a>, <a class=\"\" href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa380123%28v=vs.85%29.aspx\">3<\/a>] Due to a flaw in Schannel, a remote attacker could execute arbitrary code on both client and server applications.<a class=\"\" href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6321\">[1]<\/a><\/p>\n<p class=\"\">It may be possible for exploitation to occur without authentication and via unsolicited network traffic. According to Microsoft MS14-066, there are no known mitigations or workarounds.<a class=\"\" href=\"https:\/\/technet.microsoft.com\/library\/security\/MS14-066\">[2]<\/a><\/p>\n<p class=\"\">Microsoft patches are typically reverse-engineered and exploits developed in a matter of days or weeks.<a class=\"\" href=\"http:\/\/www.reddit.com\/r\/netsec\/comments\/2m1alz\/microsoft_security_bulletin_ms14066\/\">[4]<\/a> An anonymous Pastebin user has threatened to publish an exploit on Friday, November 14, 2014.<a class=\"\" href=\"http:\/\/pastebin.com\/bsgX01dU\">[5]<\/a><\/p>\n<h3 class=\"\">Impact<\/h3>\n<p class=\"\">This flaw allows a remote attacker to execute arbitrary code and fully compromise vulnerable systems.<a class=\"\" href=\"http:\/\/adi.is\/winshock.txt\">[6]<\/a><\/p>\n<h3 class=\"\">Solution<\/h3>\n<p class=\"\">Microsoft has released Security Bulletin MS14-066 to address this vulnerability in supported operating systems.<a class=\"\" href=\"https:\/\/technet.microsoft.com\/library\/security\/MS14-066\">[2]<\/a><\/p>\n<h3 class=\"\">References<\/h3>\n<ul class=\"\">\n<li class=\"\"><a class=\"\" href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6321\">[1] NIST Vulnerability Summary for CVE-2014-6321<\/a><\/li>\n<li class=\"\"><a class=\"\" href=\"https:\/\/technet.microsoft.com\/library\/security\/MS14-066\">[2] Microsoft Security Bulletin MS14-066 &#8211; Critical <\/a><\/li>\n<li class=\"\"><a class=\"\" href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa380123%28v=vs.85%29.aspx\">[3] Microsoft, Secure Channel<\/a><\/li>\n<li class=\"\"><a class=\"\" href=\"http:\/\/www.reddit.com\/r\/netsec\/comments\/2m1alz\/microsoft_security_bulletin_ms14066\/\">[4] Reddit, Microsoft Security Bulletin MS14-066 <\/a><\/li>\n<li class=\"\"><a class=\"\" href=\"http:\/\/pastebin.com\/bsgX01dU\">[5] Pastebin, SChannelShenanigans<\/a><\/li>\n<li class=\"\"><a class=\"\" href=\"http:\/\/adi.is\/winshock.txt\">[6] Winshock.txt<\/a><\/li>\n<\/ul>\n<h3 class=\"\">Revision History<\/h3>\n<ul class=\"\">\n<li class=\"\">November 14, 2014: Initial Release<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>National Cyber Awareness System: TA14-318A: Microsoft Secure Channel (Schannel) Vulnerability (CVE-2014-6321) 11\/14\/2014 10:32 AM EST &nbsp; Original release date: November 14, 2014 Systems Affected Microsoft Windows Server 2003 SP2 Microsoft Windows Vista SP2 Microsoft Windows Server 2008 SP2 Microsoft Windows &hellip; <a href=\"http:\/\/www.blueshell.im\/Blog\/?p=115\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":47,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/115"}],"collection":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=115"}],"version-history":[{"count":2,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/115\/revisions"}],"predecessor-version":[{"id":524,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/posts\/115\/revisions\/524"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=\/wp\/v2\/media\/47"}],"wp:attachment":[{"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=115"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.blueshell.im\/Blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}