CVE-2014-6321
Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability."
Published
2014-11-11T22:55:04.997
Last Modified
2025-04-12T10:46:40.837
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 10.0 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://blog.beyondtrust.com/triggering-ms14-066
Exploit, Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=142384364031268&w=2
Exploit, Mailing List, Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=142384364031268&w=2
Exploit, Mailing List, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/59800
Third Party Advisory
([email protected])
-
http://www.kb.cert.org/vuls/id/505120
Third Party Advisory, US Government Resource
([email protected])
-
http://www.securityfocus.com/bid/70954
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/
Exploit, Third Party Advisory
([email protected])
-
http://www.us-cert.gov/ncas/alerts/TA14-318A
Third Party Advisory, US Government Resource
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-066
Patch, Vendor Advisory
([email protected])
-
http://blog.beyondtrust.com/triggering-ms14-066
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=142384364031268&w=2
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=142384364031268&w=2
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/59800
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/505120
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/70954
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/ncas/alerts/TA14-318A
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-066
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)