SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft GDI+ Multiple Bugs Lets Local Users Gain Potentially Sensitive Information and Obtain Elevated Privileges
SecurityTracker Alert ID:  1041823
SecurityTracker URL:  http://securitytracker.com/id/1041823
CVE Reference:   CVE-2018-8427, CVE-2018-8432, CVE-2018-8472, CVE-2018-8484, CVE-2018-8486   (Links to External Site)
Date:  Oct 9 2018
Impact:   Disclosure of system information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 2012 R2, 8.1, RT 8.1, 2016, 2016 for Mac, 2019, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, 10 Version 1803, 10 Version 1809
Description:   Multiple vulnerabilities were reported in Microsoft GDI+. A local user can obtain elevated privileges on the target system. A local user can obtain potentially sensitive information.

A local user can create a specially crafted file that, when loaded by the target user, will trigger a flaw in the Microsoft Graphics Components and execute arbitrary commands on the target system with elevated privileges [CVE-2018-8432].

A local user can create a specially crafted file that, when loaded by the target user, will trigger an object memory handling flaw in the DirectX Graphics Kernel (DXGKRNL) driver [CVE-2018-8484].

A local user can run a specially crafted application to cause DirectX to disclose potentially sensitive information [CVE-2018-8486].

A local user can run a specially crafted application to cause a Microsoft Graphics Components object memory handling error and disclose potentially sensitive information [CVE-2018-8427].

A local user can run a specially crafted application to cause a Microsoft Graphics Components object memory handling error and disclose potentially sensitive information [CVE-2018-8472].

Lin Wang of Beihang University, Communications Security Establishment, Ruibo Liu of Baidu XLab Tianya Team, Lin Wang of Beihang University, and Symeon Paraschoudis of Pen Test Partners LLP reported some of these vulnerabilities.

Impact:   A local user can obtain elevated privileges on the target system.

A local user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8427
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8432
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8472
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8484
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8486

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8432 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC