MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege (2993254)

High Nessus Plugin ID 78438


The remote Windows host is affected by a privilege escalation vulnerability.


The remote Windows host is affected by a privilege escalation vulnerability in the Microsoft Message Queuing (MSMQ) service. The vulnerability can be exploited if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system.


Microsoft has released a set of patches for Windows 2003.

See Also

Plugin Details

Severity: High

ID: 78438

File Name: smb_nt_ms14-062.nasl

Version: $Revision: 1.9 $

Type: local

Agent: windows

Published: 2014/10/15

Modified: 2017/07/28

Dependencies: 57033, 13855, 10456

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/10/14

Vulnerability Publication Date: 2014/10/14

Exploitable With


Core Impact

Metasploit (MQAC.sys Arbitrary Write Privilege Escalation)

Reference Information

CVE: CVE-2014-4971

BID: 68764

OSVDB: 113188

EDB-ID: 34982

MSFT: MS14-062

MSKB: 2993254

IAVA: 2014-A-0150