SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Multiple Flaws Let Local Users Deny Service, Obtain Potentially Sensitive Information, and Gain Elevated Privileges
SecurityTracker Alert ID:  1041635
SecurityTracker URL:  http://securitytracker.com/id/1041635
CVE Reference:   CVE-2018-8271, CVE-2018-8336, CVE-2018-8410, CVE-2018-8419, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446, CVE-2018-8455   (Links to External Site)
Date:  Sep 11 2018
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, 10 Version 1803
Description:   Multiple vulnerabilities were reported in Windows Kernel. A local user can cause denial of service conditions on the target system. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.

A local user can exploit an object memory handling flaw in the Windows bowser.sys kernel-mode driver to obtain potentially sensitive information from system memory [CVE-2018-8271].

A local user can run a specially crafted application to exploit an object memory handling error in the kernel and obtain potentially sensitive information [CVE-2018-8336, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446].

The kernel fails to properly initialize a memory address. A local user can run a specially crafted application to obtain potentially sensitive information [CVE-2018-8419].

A local user can run a specially crafted application to exploit a flaw in the Windows Kernel API to gain elevated privileges on the target system [CVE-2018-8410].

A local user can run a specially crafted application to exploit an object memory handling flaw and execute arbitrary code with elevated privileges on the target system [CVE-2018-8455].

Ruibo Liu of Baidu X-Lab Tianya Team, Amichai Shulman Tal Be'ery, Haikuo Xie of Baidu Security Lab (via Trend Micro Zero Day Initiative), James Forshaw of Google Project Zero, Mauro Leggieri of TRAPMINE Inc., Tanghui Chen of Baidu X-Lab Tianya Team, and Alex Ionescu, CrowdStrike Inc. reported these vulnerabilities.

Impact:   A local user can cause denial of service conditions on the target system.

A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8271
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8336
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8410
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8419
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8442
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8443
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8445
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8446
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8455

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8271 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC