|
|
|
Windows Kernel Memory Object Initialization Errors Let Local Users Obtain Potentially Sensitive Information on the Target System
|
SecurityTracker Alert ID: 1040517 |
SecurityTracker URL: http://securitytracker.com/id/1040517
|
CVE Reference:
CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901, CVE-2018-0904, CVE-2018-0926
(Links to External Site)
|
Date: Mar 13 2018
|
Impact:
Disclosure of system information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703, 10 Version 1709
|
Description:
Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain potentially sensitive information.
A local user can run a specially crafted application to exploit a memory object initialization error and obtain potentially sensitive information that can be used to bypass Kernel Address Space Layout Randomization (ASLR) protections [CVE-2018-0811, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901, CVE-2018-0904].
A local user can run a specially crafted application to exploit a memory object initialization error and obtain potentially sensitive information on the target system [CVE-2018-0813, CVE-2018-0814, CVE-2018-0926].
Mateusz Jurczyk of Google Project Zero and fanxiaocao and pjf of IceSword Lab, Qihoo 360 reported these vulnerabilities.
|
Impact:
A local user can obtain potentially sensitive information on the target system.
|
Solution:
The vendor has issued a fix.
The Microsoft advisories are available at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0811
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0813
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0814
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0894
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0895
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0896
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0897
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0898
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0899
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0900
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0901
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0904
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0926
|
Vendor URL: portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0811 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|
Go to the Top of This SecurityTracker Archive Page
|