Article ID: 123599, created on Nov 19, 2014, last review on Jun 17, 2016

  • Applies to:
  • Operations Automation
  • Plesk for Windows
  • Virtuozzo
  • Virtuozzo containers for Windows
  • Virtual Automation
  • H-Sphere


Microsoft has revealed a vulnerability in Microsoft Windows Kerberos KDC. It affects all modern versions of Windows, including Windows Server 2003/2008/2012, Vista, 7, 8, 8.1.

Please refer to Microsoft TechNet article for details:

Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)


Microsoft has revealed a vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only. When the security bulletin was issued, Microsoft was aware of limited, targeted attacks that attempt to exploit this vulnerability.

This security update is rated Critical for all supported editions of Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.


To close the vulnerability on Windows-based hosts install the security patch from Windows Update.

For specific Parallels products, here is the list of articles which you may refer to:

Parallels Plesk

Parallels Plesk Automation

Parallels Containers for Windows

Parallels Cloud Server

Parallels Virtual Automation

Parallels Operations Automation + Parallels Business Automation - Enterprise

Parallels Business Automation - Standard

Parallels H-Sphere

Parallels Helm

Search Words


MS14-068 - Vulnerability in Kerberos Could Allow Elevation of Privilege

d02f9caf3e11b191a38179103495106f 2897d76d56d2010f4e3a28f864d69223 85a92ca67f2200d36506862eaa6ed6b8 56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c f213b9fa8759d57bee5d547445806fe7 6311ae17c1ee52b36e68aaf4ad066387 e0aff7830fa22f92062ee4db78133079 caea8340e2d186a540518d08602aa065 319940068c5fa20655215d590b7be29b 0dd5b9380c7d4884d77587f3eb0fa8ef 198398b282069eaf2d94a6af87dcb3ff 614fd0b754f34d5efe9627f2057b8642 965b49118115a610e93635d21c5694a8 400e18f6ede9f8be5575a475d2d6b0a6 5356b422f65bdad1c3e9edca5d74a1ae

Email subscription for changes to this article
Save as PDF