Lucene search

K
nessusThis script is Copyright (C) 2013-2014 Tenable Network Security, Inc.SMB_KB2914486.NASL
HistoryNov 29, 2013 - 12:00 a.m.

KB2914486: Vulnerability in Microsoft Windows Kernel Could Allow Elevation of Privilege

2013-11-2900:00:00
This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
www.tenable.com
22

0.001 Low

EPSS

Percentile

21.9%

The remote host has an unspecified privilege elevation vulnerability in NDProxy.sys, a system-provided communications driver. Successful exploitation of this vulnerability could allow an attacker to run arbitrary code in kernel mode. Additionally, the attacker could view, change or even delete data, as well as install programs and/or create new accounts with full administrative rights.

#%NASL_MIN_LEVEL 999999

#
# (C) Tenable Network Security, Inc.
#

#@DEPRECATED@
#
# Disabled on 2014/01/14.  Deprecated by smb_nt_ms14-002.nasl

include("compat.inc");

if (description)
{
  script_id(71140);
  script_version("1.10");
  script_cvs_date("Date: 2018/07/27 18:38:15");

  script_cve_id("CVE-2013-5065");
  script_bugtraq_id(63971);
  script_xref(name:"EDB-ID", value:"30014");
  script_xref(name:"IAVA", value:"2014-A-0004");

  script_name(english:"KB2914486: Vulnerability in Microsoft Windows Kernel Could Allow Elevation of Privilege");
  script_summary(english:"Checks if NDProxy.sys has been disabled.");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote Windows host has a privilege elevation vulnerability in a
system-provided communications driver."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote host has an unspecified privilege elevation vulnerability
in NDProxy.sys, a system-provided communications driver. Successful
exploitation of this vulnerability could allow an attacker to run
arbitrary code in kernel mode. Additionally, the attacker could view,
change or even delete data, as well as install programs and/or create
new accounts with full administrative rights."
  );
  script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/advisory/2914486");
  # http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?372a0377");
  script_set_attribute(
    attribute:"solution",
    value:
"Apply the workaround referenced in Microsoft Security Advisory
(2914486).  This workaround will cause certain services that rely on
Windows Telephony Application Programming Interfaces (TAPI) to not
function.  Refer to the advisory for more information."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Microsoft Windows ndproxy.sys Local Privilege Escalation');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/29");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated", "SMB/WindowsVersion");
  script_require_ports(139, 445);

  exit(0);
}

exit(0, "This plugin has been deprecated. Use smb_nt_ms14-002.nasl (plugin ID 71942) instead.");

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_reg_query.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);

if (hotfix_check_sp_range(xp:"3", win2003:"2") <= 0) audit(AUDIT_OS_SP_NOT_VULN);

port = kb_smb_transport();

registry_init();
hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);

key = "SYSTEM\CurrentControlSet\Services\NDProxy\ImagePath";

imagepath = get_registry_value(handle:hklm, item:key);

RegCloseKey(handle:hklm);
close_registry();

if ("system32\drivers\null.sys" >!< imagepath)
{
  if (report_verbosity > 0)
  {
    report = '\n  NDProxy.sys has not been modified by the workaround.\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port:port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, "NDProxy.sys");
VendorProductVersionCPE
microsoftwindowscpe:/o:microsoft:windows