Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (MS14-058)

ITS Advisory Number: 
2014-088
Date(s) Issued: 
Tuesday, October 14, 2014
Subject: 
Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (MS14-058)
Overview: 

Vulnerabilities have been discovered in Microsoft Windows Kernel-Mode Drivers that could allow for remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts.

Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Systems Affected: 
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows 8 and 8.1
  • Windows Server 2012
  • Windows RT
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Vulnerabilities have been discovered in Microsoft Windows Kernel-Mode Drivers that could allow for remote code execution.  The Windows kernel is the core of the operating system. It provides system-level services such as device management and memory management, allocates processor time to processes, and manages error handling. The details of the vulnerabilities are as follows:

  • An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory - CVE-2014-4113
  • A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts - CVE-2014-4148

Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

RECOMMENDATIONS:

Actions: 

We recommend the following actions be taken:

  • Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. 
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to open email attachments from unknown users or suspicious emails from trusted sources.
  • Apply Microsoft workaround if production allows, denying access to T2EMBED.DLL - https://technet.microsoft.com/library/security/ms14-058
References: 

Microsoft:
http://technet.microsoft.com/en-us/security/bulletin/ms14-058

CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4113
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4148