CVE-2014-4076
HIGHCVSS Vector
AV:L/AC:L/Au:N/C:C/I:C/A:C
Lifecycle Timeline
3Tags
Description
Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability."
Analysis
Microsoft Windows Server 2003 SP2 contains a local privilege escalation vulnerability via crafted IOCTL calls to tcpip.sys or tcpip6.sys drivers. Local attackers can exploit improper access control in the TCP/IP driver to gain SYSTEM privileges on the server.
Technical Context
The tcpip.sys and tcpip6.sys drivers in Windows Server 2003 SP2 improperly validate IOCTL request parameters from user-mode applications. A crafted IOCTL call can corrupt kernel memory or bypass access checks, allowing a local user to execute code with kernel/SYSTEM privileges. The TCP/IP driver is always loaded, making this a reliable escalation vector.
Affected Products
['Windows Server 2003 SP2']
Remediation
Upgrade from Windows Server 2003 to a supported operating system. If upgrade is not possible, implement strict network segmentation to limit exposure. Restrict local logon rights to minimize the attack surface. Deploy host-based IDS to detect exploitation attempts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today