Vulnerabilities > CVE-2014-0316 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Memory leak in the Local RPC (LRPC) server implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (memory consumption) and bypass the ASLR protection mechanism via a crafted client that sends messages with an invalid data view, aka "LRPC ASLR Bypass Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS14-047 |
bulletin_url | |
date | 2014-08-12T00:00:00 |
impact | Security Feature Bypass |
knowledgebase_id | 2978668 |
knowledgebase_url | |
severity | Important |
title | Vulnerability in LRPC Could Allow Security Feature Bypass |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS14-047.NASL |
description | The remote Windows host is affected by a security feature bypass vulnerability in Microsoft Remote Procedure Call (LRPC). The vulnerability is due to RPC improperly freeing malformed messages, allowing an attacker to fill up the address space of a process. Successful exploitation of the issue allows an attacker to bypass the Address Space Layout Randomization (ASLR) security feature. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 77165 |
published | 2014-08-12 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/77165 |
title | MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass (2978668) |