Vulnerabilities > CVE-2014-6317 - Improper Validation of Array Index vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font, aka "Denial of Service in Windows Kernel Mode Driver Vulnerability."
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
Msbulletin
bulletin_id | MS14-079 |
bulletin_url | |
date | 2014-11-11T00:00:00 |
impact | Denial of Service |
knowledgebase_id | 3002885 |
knowledgebase_url | |
severity | Moderate |
title | Vulnerability in Kernel-Mode Driver Could Allow Denial of Service |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS14-079.NASL |
description | The remote Windows host is affected by a denial of service vulnerability due to the Windows kernel-mode driver not properly validating array indexes when loading TrueType font files. An attacker can exploit this vulnerability by convincing a user to open a file or visit a website containing a specially crafted TrueType font file, resulting in a restart of the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 79138 |
published | 2014-11-12 |
reporter | This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/79138 |
title | MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (3002885) |
code |
|
References
- http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx
- http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx
- http://www.securityfocus.com/bid/70949
- http://www.securityfocus.com/bid/70949
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-079
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-079