SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Drivers Vendors:   Microsoft
Microsoft Windows USB Mass Storage Class Driver Memory Object Validation Error Lets Physically Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1035211
SecurityTracker URL:  http://securitytracker.com/id/1035211
CVE Reference:   CVE-2016-0133   (Links to External Site)
Date:  Mar 8 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8.1, 2012, 2012 R2, RT 8.1, 10; and prior service packs
Description:   A vulnerability was reported in Microsoft Windows USB Mass Storage Class Driver. A physically local user can obtain elevated privileges on the target system.

A physically local user can connect a specially crafted USB device to the target system to trigger a memory object validation error and execute arbitrary code on the target system with kernel-level privileges.

Andy Davis, NCC Group, reported this vulnerability.

Impact:   A physically local user can obtain kernel-level privileges on the target system.
Solution:   The vendor has issued a fix.

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=04999ea5-3414-422d-aabd-ee6213736bcd

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=93e4eb23-90af-49c3-b197-42e0c3ab6721

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=45e02aa0-d1f8-4412-93d5-2692e00cafda

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=a1d6999a-fe70-443f-afcc-de671a7a8da3

Windows Server 2008 for Itanium-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=6cb262b6-5fda-47d6-b61d-46807935e7db

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=b4ca2152-3426-46cc-bd48-7f4946dc6927

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=012d8484-6f6d-4d52-96d2-53806c0fd75f

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=45b48a27-030a-469a-8c33-975baa54fc14

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=b1da73e3-9306-40e6-88f2-c3961fadf254

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=ed0225b0-a8ae-42ff-8fb2-775d8766765a

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=51cfb897-8326-46a7-8d50-c73b4c4eec7e

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=c0573680-d86e-4f0b-a830-a1ca7bbd17cf

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=f2f16f6d-9d4d-4238-bbb6-c4300537ac4e

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-033

Vendor URL:  technet.microsoft.com/library/security/ms16-033 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC