Windows Drivers Flaws Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
|
SecurityTracker Alert ID: 1032904 |
SecurityTracker URL: http://securitytracker.com/id/1032904
|
CVE Reference:
CVE-2015-2363, CVE-2015-2365, CVE-2015-2366, CVE-2015-2367, CVE-2015-2381, CVE-2015-2382
(Links to External Site)
|
Date: Jul 14 2015
|
Impact:
Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Root access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1; and prior service packs
|
Description:
Multiple vulnerabilities were reported in Windows Drivers. A local user can obtain potentially sensitive information. A local user can gain system privileges on the target system.
A local user can run a specially crafted application to trigger an object memory handling flaw and execute arbitrary code with kernel-level privileges on the target system [CVE-2015-2363, CVE-2015-2365, CVE-2015-2366].
A local user can run a specially crafted application to trigger a memory initialization error and obtain potentially sensitive information from kernel memory on the target system [CVE-2015-2367].
A local user can run a specially crafted application to trigger a functional call error and obtain potentially sensitive information from kernel memory on the target system [CVE-2015-2381, CVE-2015-2382].
Nils Sommer of bytegeist (via Google Project Zero), enSilo, and Matt Tait of Google Project Zero reported these vulnerabilities.
|
Impact:
A local user can obtain potentially sensitive information on the target system.
A local user can obtain kernel-level privileges on the target system.
|
Solution:
The vendor has issued a fix.
Windows Server 2003 Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=297A4604-0489-4250-A657-FDFE180F48EC
Windows Server 2003 x64 Edition Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=D0CE427E-9E8B-4A25-9624-04DEAE17A307
Windows Server 2003 with SP2 for Itanium-based Systems:
https://www.microsoft.com/downloads/details.aspx?familyid=84B4217A-2BF1-4196-9E4C-5D7A83A6DFC3
Windows Vista Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=F830E6CB-45C6-4181-A943-3446F49BD465
Windows Vista x64 Edition Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=6C87E174-F075-40C1-A4F3-708A478149FF
Windows Server 2008 for 32-bit Systems Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=EB28D2D2-00B2-4431-B03B-0B3CE251A6D1
Windows Server 2008 for x64-based Systems Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=CA65562D-98EF-4EDB-BFC2-776518490C80
Windows Server 2008 for Itanium-based Systems Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=BCDB9252-2C16-4D97-92FB-A9851618DCF4
Windows 7 for 32-bit Systems Service Pack 1:
https://www.microsoft.com/downloads/details.aspx?familyid=4A532FD9-3ADF-447A-AA6F-6B7D87D8FF19
Windows 7 for x64-based Systems Service Pack 1:
https://www.microsoft.com/downloads/details.aspx?familyid=59C3C8C7-524D-414E-9F52-EA9762278BCD
Windows Server 2008 R2 for x64-based Systems Service Pack 1:
https://www.microsoft.com/downloads/details.aspx?familyid=C25807F7-58C6-4C81-BBC0-9565D9B9C74C
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:
https://www.microsoft.com/downloads/details.aspx?familyid=8C694340-FDD1-4B88-8B4A-0A2598E69387
Windows 8 for 32-bit Systems:
https://www.microsoft.com/downloads/details.aspx?familyid=8B2EBDC8-D2A1-4934-983E-AF89A40721B1
Windows 8 for x64-based Systems:
https://www.microsoft.com/downloads/details.aspx?familyid=B290A931-9098-455D-B670-E7ECFA1B6A1F
Windows 8.1 for 32-bit Systems:
https://www.microsoft.com/downloads/details.aspx?familyid=4387B603-8531-4BFC-814B-2D9349952DF8
Windows 8.1 for x64-based Systems:
https://www.microsoft.com/downloads/details.aspx?familyid=EBE80559-8AB4-4E24-B14F-79F29714C7AF
Windows Server 2012:
https://www.microsoft.com/downloads/details.aspx?familyid=9666D25C-3E4C-4F50-8FCE-1CD4E1D3CB33
Windows Server 2012 R2:
https://www.microsoft.com/downloads/details.aspx?familyid=1CD3792B-5C7D-4009-A791-39D20F6F62DE
Windows Server 2008 for 32-bit Systems Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=EB28D2D2-00B2-4431-B03B-0B3CE251A6D1
Windows Server 2008 for x64-based Systems Service Pack 2:
https://www.microsoft.com/downloads/details.aspx?familyid=CA65562D-98EF-4EDB-BFC2-776518490C80
Windows Server 2008 R2 for x64-based Systems Service Pack 1:
https://www.microsoft.com/downloads/details.aspx?familyid=C25807F7-58C6-4C81-BBC0-9565D9B9C74C
Windows Server 2012:
https://www.microsoft.com/downloads/details.aspx?familyid=9666D25C-3E4C-4F50-8FCE-1CD4E1D3CB33
Windows Server 2012 R2:
https://www.microsoft.com/downloads/details.aspx?familyid=1CD3792B-5C7D-4009-A791-39D20F6F62DE
The Microsoft advisory is available at:
https://technet.microsoft.com/library/security/ms15-073
|
Vendor URL: technet.microsoft.com/library/security/ms15-073 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|