SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel-Mode Drivers Object Access Errors Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1035212
SecurityTracker URL:  http://securitytracker.com/id/1035212
CVE Reference:   CVE-2016-0093, CVE-2016-0094, CVE-2016-0095, CVE-2016-0096   (Links to External Site)
Date:  Mar 8 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8.1, 2012, 2012 R2, RT 8.1, 10; and prior service packs
Description:   Several vulnerabilities were reported in Windows Kernel-mode Drivers. A local user can obtain elevated privileges on the target system.

A local user can and run a specially crafted application to trigger a memory object handling flaw and execute arbitrary code on the target system with kernel-level privileges.

Jueming of Security Threat Information Center, Nils Sommer of bytegeist (via Google Project Zero), bee13oy of CloverSec Labs (via HP's Zero Day Initiative), and fanxiaocao and pjf of IceSword Lab, Qihoo 360 reported these vulnerabilities.

Impact:   A local user can obtain kernel-level privileges on the target system.
Solution:   The vendor has issued a fix.

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=f169581f-533e-4c08-9b49-7dc8e611e72d

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=6fe89927-f8cf-435d-8f4d-ae182ee6473d

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=b2b1de84-61a5-44a6-9672-439faa3c42f3

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=cfaa21b9-0b5d-4218-9b74-a5a5b5c99342

Windows Server 2008 for Itanium-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=6d500905-7620-4b4d-b930-80a523894721

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=03bd9ec8-c21a-4fd3-befe-062a62818154

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=8a67301c-24bd-474a-8062-a9f3ce5169a0

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=839660db-d724-412b-971a-4570c83359e8

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=6f239bea-87f4-4fdd-b075-fa7aa1b52395

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=e9db3742-1276-4887-9f26-52290bfac32a

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=3aa940fc-7cbf-4533-8d11-4fd905cc46f3

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=060202df-1e46-4675-bf26-81c34b9e917a

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=7b413429-3105-4455-b00f-e5d42c3fb43f

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-034

Vendor URL:  technet.microsoft.com/library/security/ms16-034 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC