APP: ESKIMOROLL Kerberos Privilege Escalation

This signatures can be used to detect anomalous behavior within the Kerberos protocol.

Extended Description

The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."

Affected Products

Microsoft windows_7

References

CVE: CVE-2014-6324

Short Name
APP:MISC:ESKIMOROLL-KERBEROS-PE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
CVE-2014-6324 ESKIMOROLL Escalation Kerberos Privilege
Release Date
05/16/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
Port
TCP/88
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.0

Found a potential security threat?