APP: Kerberos Checksum Privilege Escalation

This signature detects attempts to exploit a known vulnerability in the Kerberos Checksum. A successful attack can lead to Privilege Escalation.

Extended Description

The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."

Affected Products

Microsoft windows_7

References

CVE: CVE-2014-6324

Short Name
APP:KERBEROS:CHKSUM-PRIV-ESC
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2014-6324 Checksum Escalation Kerberos Privilege
Release Date
11/10/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
Port
TCP/88
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.0

Found a potential security threat?