SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Component Object Memory Handling and Memory Address Handling Errors Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
SecurityTracker Alert ID:  1038853
SecurityTracker URL:  http://securitytracker.com/id/1038853
CVE Reference:   CVE-2017-8467, CVE-2017-8486, CVE-2017-8564, CVE-2017-8566, CVE-2017-8577, CVE-2017-8578, CVE-2017-8580, CVE-2017-8581, CVE-2017-8590   (Links to External Site)
Updated:  Jul 11 2017
Original Entry Date:  Jul 11 2017
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 8.1, 2012 R2, RT 8.1, 10, 10 Version 1511, 2016, 10 Version 1607, 10 Version 1703
Description:   Multiple vulnerabilities were reported in Windows Kernel. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.

A local user can run a specially crafted application to trigger a flaw in the Win32 driver and obtain potentially sensitive information on the target system [CVE-2017-8486].

A local user can run a specially crafted application to trigger a flaw in the kernel and obtain potentially sensitive information about kernel memory addresses, which may facilitate Kernel Address Space Layout Randomization (KASLR) bypass attacks on the target system [CVE-2017-8564].

A local user can run a specially crafted application to trigger an object memory handling error and execute arbitrary commands on the target system with elevated privileges.

The Microsoft Graphics Component is affected [CVE-2017-8467, CVE-2017-8577, CVE-2017-8578, CVE-2017-8580].

The Windows kernel-mode driver is affected [CVE-2017-8581].

The Windows Common Log File System (CLFS) driver is affected [CVE-2017-8590].

A local user can run a specially crafted application to trigger a parameter handling flaw in a method of a DCOM class in the Windows Input Method Editor (IME) to gain elevated privileges [CVE-2017-8566].

Chaitin Security Research Lab (via Trend Micro's Zero Day Initiative (ZDI)), Tencent Security - Team Sniper (Keen Lab and PC Mgr) (via Trend Micro's Zero Day Initiative (ZDI)), 360 Security (via Trend Micro's Zero Day Initiative (ZDI)), GuoPengfei from 360 Codesafe Team (via Trend Micro's Zero Day Initiative (ZDI)), pgboy and zhong_sf of Qihoo 360 Vulcan Team (via Trend Micro's Zero Day Initiative (ZDI)), Mateusz Jurczyk of Google Project Zero, and Pedro Gallegos of Microsoft Office Security Team reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8486
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8564
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8566
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8577
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8578
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8580
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8581
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8590

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8577 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC