SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Multiple Flaws Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges on the Target System
SecurityTracker Alert ID:  1040373
SecurityTracker URL:  http://securitytracker.com/id/1040373
CVE Reference:   CVE-2018-0742, CVE-2018-0756, CVE-2018-0757, CVE-2018-0809, CVE-2018-0810, CVE-2018-0820, CVE-2018-0827, CVE-2018-0828, CVE-2018-0829, CVE-2018-0830, CVE-2018-0831, CVE-2018-0832, CVE-2018-0843   (Links to External Site)
Updated:  Feb 17 2018
Original Entry Date:  Feb 13 2018
Impact:   Disclosure of system information, Disclosure of user information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 SP2, 2008 R2, 2008 R2 SP1, 8.1, RT 8.1, 2012, 2012 R2, 2016, 10, 10 Version 1511, 10 Version 1703, 10 Version 1607, 10 Version 1709
Description:   Multiple vulnerabilities were reported in Windows Kernel. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.

A local user can run a specially crafted application to trigger a memory address initialization error and obtain potentially sensitive information on the target system [CVE-2018-0810]. Versions 7 SP1, 2008 R2, 2008 R2 SP1, 2008 SP2, and 2012 are affected.

A local user can run a specially crafted application to exploit a flaw in Windows Scripting Host to bypass the a Device Guard User Mode Code Integrity (UMCI) policy on the target system [CVE-2018-0827]. Versions 7 SP1, 2008 SP2, 2012, 10 Version 1703, and 10 Version 1709 are affected.

The system may not properly secure the MultiPoint management account password. A local user can run a specially crafted application to run arbitrary code with elevated privileges on the target system [CVE-2018-0828]. Versions 7 SP1, 2008 SP2, 2012, 2016, 10 Version 1703, and 10 Version 1709 are affected.

A local user can run a specially crafted application to trigger a memory address initialization error and obtain potentially sensitive information on the target system [CVE-2018-0843].

A local user can run a specially crafted application to trigger an object memory handling error and obtain potentially sensitive information on the target system [CVE-2018-0757, CVE-2018-0829, CVE-2018-0830].

A local user can run a specially crafted application to trigger an object memory handling error and obtain elevated privileges on the target system [CVE-2018-0742, CVE-2018-0756, CVE-2018-0831,

A local user can run a specially crafted application to obtain potentially sensitive information and bypass Kernel Address Space Layout Randomization (ASLR) protection on the target system [CVE-2018-0832].

A local user can run a specially crafted application to trigger an object memory handling error and execute arbitrary code with kernel level privileges [CVE-2018-0809].

A local user can run a specially crafted application to trigger an object memory handling error and execute arbitrary code with elevated privileges [CVE-2018-0820].

Mateusz Jurczyk of Google Project Zero, Matt Nelson (@enigma0x3) of SpecterOps, fanxiaocao and pjf of IceSword Lab, Qihoo 360, Alex Ionescu, CrowdStrike Inc., WenQunWang of Tencent's Xuanwu LAB, ZhangSen of Qihoo 360 Vulcan Team, and John Heasman of DocuSign reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0742
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0756
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0757
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0809
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0810
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0820
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0827
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0828
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0829
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0830
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0831
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0832
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0843

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0810 (Links to External Site)
Cause:   Access control error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC