SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft Graphics Component Object Memory Handling Flaws Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1038237
SecurityTracker URL:  http://securitytracker.com/id/1038237
CVE Reference:   CVE-2017-0155, CVE-2017-0156   (Links to External Site)
Date:  Apr 12 2017
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 7 SP1, 8.1, RT 8.1, 2008 R2 SP1, 2008 SP2, Vista SP2, 2012 R2, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703
Description:   Two vulnerabilities were reported in Microsoft Graphics Component. A local user can obtain elevated privileges on the target system.

A local user can run a specially crafted application to trigger an object memory handling error in the Microsoft Graphics Component and execute arbitrary code on the target system with kernel-level privileges [CVE-2017-0155].

Windows Vista SP2, 7 SP1, 2008 R2 SP1, and 2008 SP2 are affected.

A local user can run a specially crafted application to trigger an object memory handling error in the Microsoft Graphics Component and execute arbitrary code on the target system with kernel-level privileges [CVE-2017-0156].

Windows 7 SP1, 8.1, RT 8.1, 2008 R2 SP1, 2008 SP2, Vista SP2, 2012 R2, 10, 10 Version 1511, 10 Version 1607, and 10 Version 1703 are affected.

bear13oy of CloverSec Labs (via Trend Micro's Zero Day Initiative) and pgboy and zhong_sf of Qihoo 360vulcan team reported these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix, available at:

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015195
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015217
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015219
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015221
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015549
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015550
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015583

A restart is required.

Vendor URL:  catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4015550 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC