Microsoft Windows up to Vista TrueType Array Index resource management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Microsoft Windows up to Vista. The impacted element is an unknown function of the component TrueType Array Index Handler. The manipulation results in resource management. This vulnerability is identified as CVE-2014-6317. The attack can be executed remotely. There is not any exploit available. It is advisable to implement a patch to correct this issue.
Details
A vulnerability, which was classified as problematic, was found in Microsoft Windows up to Vista (Operating System). Affected is some unknown functionality of the component TrueType Array Index Handler. The manipulation with an unknown input leads to a resource management vulnerability. CWE is classifying the issue as CWE-399. This is going to have an impact on availability.
The weakness was released 11/11/2014 with Secunia Research as MS14-079 as confirmed bulletin (Technet). The advisory is shared for download at technet.microsoft.com. This vulnerability is traded as CVE-2014-6317 since 09/11/2014. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 79138 (MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (3002885)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows : Microsoft Bulletins. The commercial vulnerability scanner Qualys is able to test this issue with plugin 90990 (Microsoft Windows Kernel-Mode Driver Denial of Service Vulnerability (MS14-079)).
Applying the patch MS14-079 is able to eliminate this problem. The bugfix is ready for download at technet.microsoft.com. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (98344), Tenable (79138), SecurityFocus (BID 70949†), SecurityTracker (ID 1031198†) and Vulnerability Center (SBV-47034†). Entries connected to this vulnerability are available at VDB-68192, VDB-68194 and VDB-68195. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 79138
Nessus Name: MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (3002885)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: MS14-079
Timeline
09/11/2014 🔍11/11/2014 🔍
11/11/2014 🔍
11/11/2014 🔍
11/11/2014 🔍
11/11/2014 🔍
11/11/2014 🔍
11/12/2014 🔍
11/12/2014 🔍
11/12/2014 🔍
12/14/2024 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: MS14-079
Organization: Secunia Research
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-6317 (🔍)
GCVE (CVE): GCVE-0-2014-6317
GCVE (VulDB): GCVE-100-68196
OVAL: 🔍
X-Force: 98344 - Microsoft Windows Kernel Mode Driver denial of service, High Risk
SecurityFocus: 70949 - Microsoft Windows Kernel TrueType Font Parsing CVE-2014-6317 Denial of Service Vulnerability
SecurityTracker: 1031198 - Windows Kernel-Mode Drivers TrueType Array Index Bug Lets Remote Users Deny Service
Vulnerability Center: 47034 - [MS14-079] Microsoft Windows Remote DoS due to an Error in Kernel-Mode Drivers - CVE-2014-6317, High
scip Labs: https://www.scip.ch/en/?labs.20140213
See also: 🔍
Entry
Created: 11/12/2014 17:51Updated: 12/14/2024 21:34
Changes: 11/12/2014 17:51 (75), 04/07/2017 15:00 (6), 02/24/2022 17:51 (2), 02/24/2022 17:59 (1), 12/14/2024 21:34 (16)
Complete: 🔍
Cache ID: 216:F42:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.