SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Multiple Flaws Let Local Users Obtain Potentially Sensitive Information, Bypass Security Features, and Gain Elevated Privileges on the Target System
SecurityTracker Alert ID:  1039325
SecurityTracker URL:  http://securitytracker.com/id/1039325
CVE Reference:   CVE-2017-8675, CVE-2017-8678, CVE-2017-8679, CVE-2017-8687, CVE-2017-8708, CVE-2017-8709, CVE-2017-8710, CVE-2017-8716, CVE-2017-8719, CVE-2017-8720   (Links to External Site)
Date:  Sep 12 2017
Impact:   Disclosure of system information, Disclosure of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2016, 8.1, 2012 R2, RT 8.1, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703
Description:   Multiple vulnerabilities were reported in Windows Kernel. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system. A local user can bypass security restrictions.

A local user can run a specially crafted application to trigger an object memory handling error and execute arbitrary code on the target system with kernel-level privileges [CVE-2017-8675, CVE-2017-8720].

A local user can run a specially crafted application to trigger an object memory handling error and obtain potentially sensitive information that can be used to bypass Kernel Address Space Layout Randomization (KASLR) protections on the target system [CVE-2017-8687, CVE-2017-8708].

A local user can run a specially crafted application to trigger an object memory handling error and obtain potentially sensitive information on the target system [CVE-2017-8678, CVE-2017-8679, CVE-2017-8709, CVE-2017-8719].

A user can create an XML file with specially crafted External XML Entity references that, when loaded by the target user, will exploit a flaw in the Windows System Information Console to access files on the target user's system [CVE-2017-8710].

A local user can run a specially crafted application to trigger an object memory handling error and bypass the Windows Control Flow Guard protections on the target system [CVE-2017-8716].

WenQunWang of Tencent's Xuanwu LAB, fanxiaocao and pjf of IceSword Lab, Qihoo 360, SaifAllah benMassaoud (@benmassaou), Zhang Yunhai of NSFOCUS, and Jaanus Kp of Clarified Security (via Trend Micro's Zero Day Initiative) reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

A local user can bypass security controls on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8675
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8678
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8679
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8687
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8708
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8709
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8710
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8716
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8719
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8720

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8675 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC