Windows Kernel Component Object Memory Handling and Memory Address Handling Errors Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
|
SecurityTracker Alert ID: 1038853 |
SecurityTracker URL: http://securitytracker.com/id/1038853
|
CVE Reference:
CVE-2017-8467, CVE-2017-8486, CVE-2017-8564, CVE-2017-8566, CVE-2017-8577, CVE-2017-8578, CVE-2017-8580, CVE-2017-8581, CVE-2017-8590
(Links to External Site)
|
Updated: Jul 11 2017
|
Original Entry Date: Jul 11 2017
|
Impact:
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Root access via local system, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 8.1, 2012 R2, RT 8.1, 10, 10 Version 1511, 2016, 10 Version 1607, 10 Version 1703
|
Description:
Multiple vulnerabilities were reported in Windows Kernel. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.
A local user can run a specially crafted application to trigger a flaw in the Win32 driver and obtain potentially sensitive information on the target system [CVE-2017-8486].
A local user can run a specially crafted application to trigger a flaw in the kernel and obtain potentially sensitive information about kernel memory addresses, which may facilitate Kernel Address Space Layout Randomization (KASLR) bypass attacks on the target system [CVE-2017-8564].
A local user can run a specially crafted application to trigger an object memory handling error and execute arbitrary commands on the target system with elevated privileges.
The Microsoft Graphics Component is affected [CVE-2017-8467, CVE-2017-8577, CVE-2017-8578, CVE-2017-8580].
The Windows kernel-mode driver is affected [CVE-2017-8581].
The Windows Common Log File System (CLFS) driver is affected [CVE-2017-8590].
A local user can run a specially crafted application to trigger a parameter handling flaw in a method of a DCOM class in the Windows Input Method Editor (IME) to gain elevated privileges [CVE-2017-8566].
Chaitin Security Research Lab (via Trend Micro's Zero Day Initiative (ZDI)), Tencent Security - Team Sniper (Keen Lab and PC Mgr) (via Trend Micro's Zero Day Initiative (ZDI)), 360 Security (via Trend Micro's Zero Day Initiative (ZDI)), GuoPengfei from 360 Codesafe Team (via Trend Micro's Zero Day Initiative (ZDI)), pgboy and zhong_sf of Qihoo 360 Vulcan Team (via Trend Micro's Zero Day Initiative (ZDI)), Mateusz Jurczyk of Google Project Zero, and Pedro Gallegos of Microsoft Office Security Team reported these vulnerabilities.
|
Impact:
A local user can obtain potentially sensitive information on the target system.
A local user can obtain elevated privileges on the target system.
|
Solution:
The vendor has issued a fix.
The Microsoft advisories are available at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8486
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8564
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8566
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8577
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8578
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8580
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8581
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8590
|
Vendor URL: portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8577 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|