SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Multiple Flaws Let Local Users Bypass Security Restictions, Obtain Potentially Sensitive Information, and Gain Elevated Privileges on the Target System
SecurityTracker Alert ID:  1040849
SecurityTracker URL:  http://securitytracker.com/id/1040849
CVE Reference:   CVE-2018-0854, CVE-2018-0958, CVE-2018-8120, CVE-2018-8124, CVE-2018-8127, CVE-2018-8129, CVE-2018-8132, CVE-2018-8134, CVE-2018-8136, CVE-2018-8141, CVE-2018-8170, CVE-2018-8897   (Links to External Site)
Date:  May 8 2018
Impact:   Disclosure of system information, Disclosure of user information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, 10 Version 1803
Description:   Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system. A local user can bypass security restrictions.

A local user can run a specially crafted application to exploit an object memory handling flaw in Windows Scripting Host and bypass Device Guard User Mode Code Integrity (UMCI) policy on the target system [CVE-2018-0854]. Versions 2016, 10, 10 Version 1607, 10 Version 1703, and 10 Version 1709 are affected.

A local user can run a specially crafted application to exploit a policy validation flaw and bypass Device Guard User Mode Code Integrity (UMCI) policy on the target system [CVE-2018-0958]. Versions 2016, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, and 10 Version 1803 are affected.

A local user can run a specially crafted application to exploit a policy validation flaw and bypass Device Guard User Mode Code Integrity (UMCI) policy on the target system [CVE-2018-8129, CVE-2018-8132].

A local user can obtain potentially sensitive information on the target system.

A local user can run a specially crafted application to exploit an object memory handling flaw in Win32k and execute arbitrary code on the target system with kernel-level privileges [CVE-2018-8120, CVE-2018-8124].

A local user can run a specially crafted application to exploit an object memory handling flaw in the kernel and obtain potentially sensitive information [CVE-2018-8127, CVE-2018-8141].

A local user can run a specially crafted application to exploit a permissions management flaw in the Windows Kernel API and impersonate processes and cross-process communications on the target system [CVE-2018-8134].

A local user with a domain user account can create a specially crafted request to trigger an object memory handling flaw and execute arbitrary code with elevated permissions on the target system [CVE-2018-8136].

A local user can run a specially crafted application to trigger an object memory handling flaw in the kernel and execute arbitrary code with kernel-level privileges on the target system [CVE-2018-8897

A local user can run a specially crafted application to trigger an object memory handling flaw in the Windows kernel image and execute arbitrary code with elevated privileges on the target system [CVE-2018-8170].

Matt Graeber of SpecterOps, Lee Christensen (@tifkin_) of SpecterOps, nyaacate of Viettel Cyber Security (via Trend Micro's Zero Day Initiative), Andrei Vlad Lutas of Bitdefender, Rohit Mothe of Project Minus Storm Team, Intel Corp., Aaron Margosis of Microsoft, Alex Bass of Microsoft, James Forshaw of Google Project Zero, Kushal Arvind Shah of Fortinet's FortiGuard Labs, Nick Peterson, Everdox Tech LLC, Andy Lutomirski, Anton Cherepanov, Senior Malware Researcher of ESET, and Ken Johnson reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

A local user can bypass security controls on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0854
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0958
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8124
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8127
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8129
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8132
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8134
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8136
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8141
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8170
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0854 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC