SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft Graphics Components Object Memory Handling and Memory Mapping Bugs Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1040673
SecurityTracker URL:  http://securitytracker.com/id/1040673
CVE Reference:   CVE-2018-1008, CVE-2018-1009   (Links to External Site)
Date:  Apr 12 2018
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 2016, 8.1, RT 8.1, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703, 10 Version 1709
Description:   Two vulnerabilities were reported in Microsoft Graphics Components. A local user can obtain elevated privileges on the target system.

A local user can run a specially crafted application to trigger an object memory handling flaw in the Windows Graphics Component to execute arbitrary code on the target system with kernel-level privileges [CVE-2018-1008].

A local user can run a specially crafted application to trigger an object memory handling and memory mapping flaw in the Microsoft DirectX graphics kernel subsystem ('dxgkrnl.sys') to execute arbitrary code on the target system with kernel-level privileges [CVE-2018-1009].

Haikuo Xie and Zheng Huang of Baidu Security Lab (via Trend Micro Zero Day Initiative) and Roi Mallo of Reverse Engineering R&D reported these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1009

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, SecurityGlobal.net LLC