Korean
<< Back
VID 26683
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS14-062, 2993254) for 'Vulnerability in Message Queuing Service Could Allow Elevation of Privilege' has not been applied.
This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue.

- MQAC Arbitrary Write Privilege Escalation Vulnerability (CVE-2014-4971)
A vulnerability exists in the Microsoft Message Queuing (MSMQ) service that could allow an attacker to elevate privileges on the targeted system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/library/security/ms14-062

* Platforms Affected:
Windows Server 2003 SP2
Windows Server 2003 x64 SP2
Windows Server 2003 SP2 for Itanium
Recommendation Apply the appropriate patch(2993254) for your system, as listed in Microsoft Security Bulletin MS14-062 at https://technet.microsoft.com/en-us/library/security/ms14-062
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2014-4971 (CVE)
Related URL 68764 (SecurityFocus)
Related URL (ISS)