SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Mount Point Validation Flaw Lets Local Users Obtain System Privileges
SecurityTracker Alert ID:  1034645
SecurityTracker URL:  http://securitytracker.com/id/1034645
CVE Reference:   CVE-2016-0006, CVE-2016-0007   (Links to External Site)
Date:  Jan 12 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1, 10; and prior service packs
Description:   Two vulnerabilities were reported in the Windows Kernel. A local user can gain system privileges on the target system.

The Windows kernel does not properly validate reparse point objects that have been set by a sandboxed application. A local user can gain run a specially crafted application to execute arbitrary code with LocalSystem privileges on the target system.


Impact:   A local user can gain LocalSystem privileges on the target system.
Solution:   The vendor has issued a fix.

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=d72a1775-bd1b-46ba-8012-0a1f58f548ef

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=349fdfb7-e5ed-4179-8b98-70fc3c5b7673

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=2b012a0d-bd75-4f79-a3ae-4575fbb78699

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=f61a3027-fff2-4634-9c59-c750bee59840

Windows Server 2008 for Itanium-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=442a4774-e720-421d-8119-c21157c4e6d3

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=9e3c44ff-f90a-48fb-b567-9a6a36e192f6

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=78a60489-5e02-40de-905c-855383cd38ae

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=1b3eaa2e-03f2-455c-871b-e239e932dc6f

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=8877f9fb-a23b-4a1e-af69-806b66247c5f

Windows 8 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=23fd4dcf-40b6-47f1-bdbb-0dc5b721fbef

Windows 8 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=6d3ac665-f25a-4155-8445-ff95e001add7

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=16c658d4-7311-44b3-b84e-3c4fbc0ec445

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=a9ba6945-7413-462f-9241-b27ffa0c11ae

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=f147a486-aa5d-41a4-9e39-4d87baff389b

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=35765702-d133-4d4a-a0b0-6f6d93036f23

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=2b012a0d-bd75-4f79-a3ae-4575fbb78699

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=f61a3027-fff2-4634-9c59-c750bee59840

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=1b3eaa2e-03f2-455c-871b-e239e932dc6f

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=f147a486-aa5d-41a4-9e39-4d87baff389b

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=35765702-d133-4d4a-a0b0-6f6d93036f23

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-008

Vendor URL:  technet.microsoft.com/library/security/ms16-008 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC