MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)

high Nessus Plugin ID 78433

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host is affected by multiple vulnerabilities :

- A privilege escalation vulnerability allows an attacker to run arbitrary code in kernel mode due to the kernel-mode driver improperly handling objects in memory. (CVE-2014-4113)

- A remote code execution vulnerability allows a remote attacker to run arbitrary code in kernel mode due to the kernel-mode driver improperly handling TrueType fonts.
An attacker can exploit this vulnerability by convincing a user to open a file or visit a website containing a specially crafted TrueType font file. (CVE-2014-4148)

Solution

Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-058

Plugin Details

Severity: High

ID: 78433

File Name: smb_nt_ms14-058.nasl

Version: 1.14

Type: local

Agent: windows

Published: 10/15/2014

Updated: 5/25/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-4148

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/14/2014

Vulnerability Publication Date: 10/14/2014

CISA Known Exploited Vulnerability Due Dates: 5/25/2022, 6/15/2022

Exploitable With

Core Impact

Metasploit (Windows TrackPopupMenu Win32k NULL Pointer Dereference)

Reference Information

CVE: CVE-2014-4113, CVE-2014-4148

BID: 70364, 70429

MSFT: MS14-058

MSKB: 3000061