SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Windows Component Flaws Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040520
SecurityTracker URL:  http://securitytracker.com/id/1040520
CVE Reference:   CVE-2018-0868, CVE-2018-0877, CVE-2018-0880, CVE-2018-0881, CVE-2018-0882, CVE-2018-0902, CVE-2018-0977, CVE-2018-0983   (Links to External Site)
Date:  Mar 13 2018
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703, 10 Version 1709
Description:   Multiple vulnerabilities were reported in several Windows components. A local user can obtain elevated privileges on the target system.

The Windows Installer does not properly sanitize user-supplied input. A local user can exploit this library loading error to execute arbitrary code with system privileges [CVE-2018-0868].

The Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) does not properly validate and enforce impersonation levels [CVE-2018-0902]. A local user can create a specially crafted application that, when run by the target user, will gain access to information beyond the access level of the local user.

A local user can run a specially crafted application to trigger an object memory handling error in the Windows kernel-mode driver and execute arbitrary commands on the target system with kernel level privileges [CVE-2018-0977].

A local user can run a specially crafted application to trigger an object memory handling error in Storage Services and execute arbitrary commands on the target system with kernel level privileges [CVE-2018-0983].

A local user can run a specially crafted application to trigger a file path management error in the Desktop Bridge VFS and execute arbitrary commands on the target system with kernel level privileges [CVE-2018-0877].

A local user can run a specially crafted application to an error in managing the virtual registry in the Desktop Bridge VFS and execute arbitrary commands on the target system with elevated privileges [CVE-2018-0880].

A local user can run a specially crafted application to trigger an object memory handling error in the the Microsoft Video Control and execute arbitrary commands on the target system with system level privileges [CVE-2018-0881].

A local user can run a specially crafted application to an error in managing the virtual registry in Desktop Bridge and execute arbitrary commands on the target system with kernel-level privileges [CVE-2018-0882].

Daniel Docherty of MWR Labs, @SandboxEscaper, Matt Nelson (@enigma0x3) of SpecterOps, James Forshaw of Google Project Zero, Anonymous (via Trend Micro Zero Day Initiative), and Nicolas Joly of MSRCE UK reported these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0868
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0877
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0880
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0881
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0882
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0902
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0977
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0983

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0868 (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC