|
|
|
Windows Kernel Multiple Flaws Let Local Users Deny Service, Obtain Potentially Sensitive Information, and Gain Elevated Privileges
|
SecurityTracker Alert ID: 1041635 |
SecurityTracker URL: http://securitytracker.com/id/1041635
|
CVE Reference:
CVE-2018-8271, CVE-2018-8336, CVE-2018-8410, CVE-2018-8419, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446, CVE-2018-8455
(Links to External Site)
|
Date: Sep 11 2018
|
Impact:
Denial of service via local system, Disclosure of system information, Disclosure of user information, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, 10 Version 1803
|
Description:
Multiple vulnerabilities were reported in Windows Kernel. A local user can cause denial of service conditions on the target system. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.
A local user can exploit an object memory handling flaw in the Windows bowser.sys kernel-mode driver to obtain potentially sensitive information from system memory [CVE-2018-8271].
A local user can run a specially crafted application to exploit an object memory handling error in the kernel and obtain potentially sensitive information [CVE-2018-8336, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446].
The kernel fails to properly initialize a memory address. A local user can run a specially crafted application to obtain potentially sensitive information [CVE-2018-8419].
A local user can run a specially crafted application to exploit a flaw in the Windows Kernel API to gain elevated privileges on the target system [CVE-2018-8410].
A local user can run a specially crafted application to exploit an object memory handling flaw and execute arbitrary code with elevated privileges on the target system [CVE-2018-8455].
Ruibo Liu of Baidu X-Lab Tianya Team, Amichai Shulman Tal Be'ery, Haikuo Xie of Baidu Security Lab (via Trend Micro Zero Day Initiative), James Forshaw of Google Project Zero, Mauro Leggieri of TRAPMINE Inc., Tanghui Chen of Baidu X-Lab Tianya Team, and Alex Ionescu, CrowdStrike Inc. reported these vulnerabilities.
|
Impact:
A local user can cause denial of service conditions on the target system.
A local user can obtain potentially sensitive information on the target system.
A local user can obtain elevated privileges on the target system.
|
Solution:
The vendor has issued a fix.
The Microsoft advisories are available at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8271
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8336
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8410
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8419
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8442
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8443
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8445
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8446
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8455
|
Vendor URL: portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8271 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|
Go to the Top of This SecurityTracker Archive Page
|