SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Drivers Vendors:   Microsoft
Windows Drivers Flaws Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
SecurityTracker Alert ID:  1032904
SecurityTracker URL:  http://securitytracker.com/id/1032904
CVE Reference:   CVE-2015-2363, CVE-2015-2365, CVE-2015-2366, CVE-2015-2367, CVE-2015-2381, CVE-2015-2382   (Links to External Site)
Date:  Jul 14 2015
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1; and prior service packs
Description:   Multiple vulnerabilities were reported in Windows Drivers. A local user can obtain potentially sensitive information. A local user can gain system privileges on the target system.

A local user can run a specially crafted application to trigger an object memory handling flaw and execute arbitrary code with kernel-level privileges on the target system [CVE-2015-2363, CVE-2015-2365, CVE-2015-2366].

A local user can run a specially crafted application to trigger a memory initialization error and obtain potentially sensitive information from kernel memory on the target system [CVE-2015-2367].

A local user can run a specially crafted application to trigger a functional call error and obtain potentially sensitive information from kernel memory on the target system [CVE-2015-2381, CVE-2015-2382].

Nils Sommer of bytegeist (via Google Project Zero), enSilo, and Matt Tait of Google Project Zero reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain kernel-level privileges on the target system.

Solution:   The vendor has issued a fix.

Windows Server 2003 Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=297A4604-0489-4250-A657-FDFE180F48EC

Windows Server 2003 x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=D0CE427E-9E8B-4A25-9624-04DEAE17A307

Windows Server 2003 with SP2 for Itanium-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=84B4217A-2BF1-4196-9E4C-5D7A83A6DFC3

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=F830E6CB-45C6-4181-A943-3446F49BD465

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=6C87E174-F075-40C1-A4F3-708A478149FF

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=EB28D2D2-00B2-4431-B03B-0B3CE251A6D1

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=CA65562D-98EF-4EDB-BFC2-776518490C80

Windows Server 2008 for Itanium-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=BCDB9252-2C16-4D97-92FB-A9851618DCF4

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=4A532FD9-3ADF-447A-AA6F-6B7D87D8FF19

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=59C3C8C7-524D-414E-9F52-EA9762278BCD

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=C25807F7-58C6-4C81-BBC0-9565D9B9C74C

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=8C694340-FDD1-4B88-8B4A-0A2598E69387

Windows 8 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=8B2EBDC8-D2A1-4934-983E-AF89A40721B1

Windows 8 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=B290A931-9098-455D-B670-E7ECFA1B6A1F

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=4387B603-8531-4BFC-814B-2D9349952DF8

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=EBE80559-8AB4-4E24-B14F-79F29714C7AF

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=9666D25C-3E4C-4F50-8FCE-1CD4E1D3CB33

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=1CD3792B-5C7D-4009-A791-39D20F6F62DE

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=EB28D2D2-00B2-4431-B03B-0B3CE251A6D1

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=CA65562D-98EF-4EDB-BFC2-776518490C80

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=C25807F7-58C6-4C81-BBC0-9565D9B9C74C

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=9666D25C-3E4C-4F50-8FCE-1CD4E1D3CB33

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=1CD3792B-5C7D-4009-A791-39D20F6F62DE

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms15-073

Vendor URL:  technet.microsoft.com/library/security/ms15-073 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC