CVE-2014-4076 – Microsoft Windows Server 2003 SP2 - Local Privilege Escalation (MS14-070)
https://notcve.org/view.php?id=CVE-2014-4076
Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability." Microsoft Windows Server 2003 SP2 permite a usuarios locales ganar privilegios a través de una llamada IOCTL manipulada a (1) tcpip.sys o (2) tcpip6.sys, también conocido como 'vulnerabilidad de elevación de privilegios de TCP/IP.' A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys, can allow an attacker to inject controlled memory into an arbitrary location within the kernel. • https://www.exploit-db.com/exploits/35936 https://www.exploit-db.com/exploits/37755 https://github.com/fungoshacks/CVE-2014-4076 http://www.exploit-db.com/exploits/35936 http://www.osvdb.org/114532 http://www.securityfocus.com/bid/70976 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-070 https://blog.korelogic.com/blog/2015/01/28/2k3_tcpip_setaddroptions_exploit_dev https://www.korelogic.com/Resources/Advisories/KL-001-2015-001.txt • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-4118
https://notcve.org/view.php?id=CVE-2014-4118
XML Core Services (aka MSXML) 3.0 in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (system-state corruption) via crafted XML content, aka "MSXML Remote Code Execution Vulnerability." XML Core Services (también conocido como MSXML) 3.0 en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción del estado del sistema) a través de contenidos XML manipulados, también conocido como 'vulnerabilidad de ejecución de código remoto MSXML.' • http://www.securitytracker.com/id/1031187 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-067 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2014-6317
https://notcve.org/view.php?id=CVE-2014-6317
Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font, aka "Denial of Service in Windows Kernel Mode Driver Vulnerability." Error del indice del array en win32k.sys en los controladores del modo kernel en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a atacantes remotos causar una denegación de servicio (reinicio) a través de una fuente TrueType manipulada, también conocido como 'vulnerabilidad de denegación de servicio en los controladores del modo kernel en Windows.' • http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx http://www.securityfocus.com/bid/70949 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-079 • CWE-129: Improper Validation of Array Index •
CVE-2014-6321
https://notcve.org/view.php?id=CVE-2014-6321
Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability." Schannel en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a atacantes remotos ejecutar código arbitrario a través de paquetes manipulados, también conocido como 'vulnerabilidad de la ejecución de código remoto de Microsoft Schannel.' • http://blog.beyondtrust.com/triggering-ms14-066 http://marc.info/?l=bugtraq&m=142384364031268&w=2 http://secunia.com/advisories/59800 http://www.kb.cert.org/vuls/id/505120 http://www.securityfocus.com/bid/70954 http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock http://www.us-cert.gov/ncas/alerts/TA14-318A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-066 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2014-6332 – Microsoft Windows Object Linking & Embedding (OLE) Automation Array Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-6332
OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability." OleAut32.dll en OLE en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2 y Windows RT Gold y 8.1 permite a atacantes remotos ejecutar código arbitrario a través de un sitio web manipulado, según lo demostrado por un intento de redimensionamiento de un array que desencadena un manejo incorrecto de un valor de tamaño en la función SafeArrayDimen, también conocido como "Windows OLE Automation Array Remote Code Execution Vulnerability". Microsoft HTA (HTML Application) suffers from a remote code execution vulnerability. OleAut32.dll in OLE in Microsoft Windows allows remote attackers to remotely execute code via a crafted web site. • https://www.exploit-db.com/exploits/36516 https://www.exploit-db.com/exploits/37400 https://www.exploit-db.com/exploits/38500 https://www.exploit-db.com/exploits/37668 https://www.exploit-db.com/exploits/35229 https://www.exploit-db.com/exploits/35230 https://www.exploit-db.com/exploits/35308 https://www.exploit-db.com/exploits/37800 https://www.exploit-db.com/exploits/38512 https://github.com/mourr/CVE-2014-6332 http://packetstormsecurity.com/files/134053/Avant& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •