MS14-019: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)

medium Nessus Plugin ID 73416

Synopsis

The remote Windows host is potentially affected by a remote code execution vulnerability.

Description

The remote Windows host is potentially affected by a vulnerability in the way that Windows processes .bat and .cmd files that could allow remote code execution if a user is convinced to run a specially crafted .bat or .cmd file. When exploiting this vulnerability, an attacker could gain the same user permissions as the current user.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-019

Plugin Details

Severity: Medium

ID: 73416

File Name: smb_nt_ms14-019.nasl

Version: 1.10

Type: local

Agent: windows

Published: 4/8/2014

Updated: 11/26/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-0315

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 4/8/2014

Vulnerability Publication Date: 4/8/2014

Reference Information

CVE: CVE-2014-0315

BID: 66619

MSFT: MS14-019

MSKB: 2922229