CISA KEV 정보
| 취약점명 | Microsoft Win32k Privilege Escalation Vulnerability |
|---|---|
| 설명 | Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-264 |
| 등록일 (KEV) | 2022-05-04 |
| 조치 기한 | 2022-05-25 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2014-4113 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
참조
- http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/ [Exploit, Not Applicable]
- http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx [Not Applicable, Vendor Advisory]
- http://osvdb.org/show/osvdb/113167 [Broken Link]
- http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html [Exploit, Third Party Advisory, VDB Entry]
- http://secunia.com/advisories/60970 [Broken Link]
- http://www.exploit-db.com/exploits/35101 [Exploit, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/70364 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058 [Patch, Vendor Advisory]
- https://github.com/sam-b/CVE-2014-4113 [Third Party Advisory]
- https://www.exploit-db.com/exploits/37064/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/39666/ [Third Party Advisory, VDB Entry]
- http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/ [Exploit, Not Applicable]
- http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx [Not Applicable, Vendor Advisory]
- http://osvdb.org/show/osvdb/113167 [Broken Link]
- http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html [Exploit, Third Party Advisory, VDB Entry]
- ... 외 8건
This product uses the NVD API but is not endorsed or certified by the NVD.