First published: Tue Nov 11 2014(Updated: )
Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6321 has a high severity rating, indicating that it can lead to remote code execution.
To fix CVE-2014-6321, apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2014-6321 affects several versions including Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2003, and others.
CVE-2014-6321 allows remote attackers to execute arbitrary code via crafted packets sent to the Schannel component.
While updating is the best solution, disabling Schannel support for certain protocols can serve as a temporary workaround until patches are applied.