Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2014-4113 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | This vulnerability is being exploited in the wild. |
Vulnerable software Subscribe |
Windows Server Operating systems & Components / Operating system Windows Operating systems & Components / Operating system |
Vendor | Microsoft |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU4865
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2014-4113
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to obtain elevated privileges on the target system.
The weakness exists due to improper handling of objects in memory by kernel-mode driver (win32k.sys). A local attacker can run a specially crafted application to gain elevated privileges and take complete control of the system.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Install update from vendor's website.
Windows Server: 2003 - 2012 R2
Windows: 7 - Vista
http://technet.microsoft.com/en-us/library/security/ms14-058
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?