ID CVE-2014-1767
Summary Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_7:-:sp1
    cpe:2.3:o:microsoft:windows_7:-:sp1
  • cpe:2.3:o:microsoft:windows_8
    cpe:2.3:o:microsoft:windows_8
  • cpe:2.3:o:microsoft:windows_8.1
    cpe:2.3:o:microsoft:windows_8.1
  • Microsoft Windows RT
    cpe:2.3:o:microsoft:windows_rt
  • Microsoft Windows RT 8.1
    cpe:2.3:o:microsoft:windows_rt_8.1
  • Microsoft Windows Server 2003 Service Pack 2
    cpe:2.3:o:microsoft:windows_server_2003:-:sp2
  • Microsoft Windows Server 2008 Service Pack 2
    cpe:2.3:o:microsoft:windows_server_2008:-:sp2
  • Microsoft Windows Server 2008 R2 Service Pack 1
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1
  • Microsoft Windows Server 2012
    cpe:2.3:o:microsoft:windows_server_2012
  • cpe:2.3:o:microsoft:windows_server_2012:r2
    cpe:2.3:o:microsoft:windows_server_2012:r2
  • Microsoft Windows Vista Service Pack 2
    cpe:2.3:o:microsoft:windows_vista:-:sp2
CVSS
Base: 7.2 (as of 02-09-2016 - 17:31)
Impact:
Exploitability:
CWE CWE-415
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description Microsoft Windows - AFD.SYS Privilege Escalation (MS14-040) Win7x64. CVE-2014-1767. Local exploit for win64 platform
    file exploits/windows_x86-64/local/39525.py
    id EDB-ID:39525
    last seen 2016-03-09
    modified 2016-03-07
    platform windows_x86-64
    port
    published 2016-03-07
    reporter Rick Larabee
    source https://www.exploit-db.com/download/39525/
    title Microsoft Windows - AFD.SYS Privilege Escalation MS14-040 Win7x64
    type local
  • description Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040). CVE-2014-1767. Local exploit for win32 platform
    file exploits/windows_x86/local/39446.py
    id EDB-ID:39446
    last seen 2016-02-21
    modified 2016-02-15
    platform windows_x86
    port
    published 2016-02-15
    reporter Rick Larabee
    source https://www.exploit-db.com/download/39446/
    title Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation MS14-040
    type local
msbulletin via4
bulletin_id MS14-040
bulletin_url
date 2014-07-08T00:00:00
impact Elevation of Privilege
knowledgebase_id 2975684
knowledgebase_url
severity Important
title Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS14-040.NASL
description The remote Windows host contains a version of the Ancillary Function Driver (afd.sys) that is affected by a privilege escalation vulnerability. The flaw is due to the Ancillary Function Driver not properly processing user-supplied input, leading to a double free scenario, allowing a local attacker to elevate privileges by running a specially crafted application.
last seen 2018-09-02
modified 2018-07-30
plugin id 76409
published 2014-07-08
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=76409
title MS14-040: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684)
packetstorm via4
data source https://packetstormsecurity.com/files/download/135795/MS14-040.txt
id PACKETSTORM:135795
last seen 2016-12-05
published 2016-02-16
reporter Rick Larabee
source https://packetstormsecurity.com/files/135795/Microsoft-AFD.SYS-Dangling-Pointer-Privilege-Escalation.html
title Microsoft AFD.SYS Dangling Pointer Privilege Escalation
refmap via4
bid 68394
misc http://www.zerodayinitiative.com/advisories/ZDI-14-220/
secunia 59778
Last major update 02-09-2016 - 17:35
Published 08-07-2014 - 18:55
Last modified 12-10-2018 - 18:06
Back to Top