SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel-Mode Drivers Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1025761
SecurityTracker URL:  http://securitytracker.com/id/1025761
CVE Reference:   CVE-2011-1874, CVE-2011-1875, CVE-2011-1876, CVE-2011-1877, CVE-2011-1878, CVE-2011-1879, CVE-2011-1880, CVE-2011-1881, CVE-2011-1882, CVE-2011-1883, CVE-2011-1884, CVE-2011-1885, CVE-2011-1886, CVE-2011-1887, CVE-2011-1888   (Links to External Site)
Date:  Jul 12 2011
Impact:   Disclosure of system information, Disclosure of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1; and prior service packs
Description:   Multiple vulnerabilities were reported in the Windows Kernel-mode Driver (win32k.sys). A local user can obtain elevated privileges on the target system. A local user can read kernel memory.

A local user can run a specially crafted program to trigger a use-after-free on kernel-mode driver objects to execute arbitrary commands on the target system with kernel level privileges [CVE-2011-1874, CVE-2011-1875, CVE-2011-1876, CVE-2011-1877, CVE-2011-1878, CVE-2011-1879, CVE-2011-1882, CVE-2011-1883, CVE-2011-1884].

A local user can run a specially crafted program to trigger a null-pointer dereference and execute arbitrary commands on the target system with kernel level privileges [CVE-2011-1880, CVE-2011-1881, CVE-2011-1885, CVE-2011-1887, CVE-2011-1888].

Tarjei Mandt of Norman reported these privilege escalation vulnerabilities.

A local user can run a specially crafted program to trigger a null-pointer dereference and read kernel memory contents, including the Security Account Manager (SAM) database [CVE-2011-1886].

Mr. Liang Yin, Prof. Sihan Qing and Weiping Wen, and Mr. Husheng Zhou, Department of Information Security, Beijing University, reported this information disclosure vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.

A local user can read kernel memory.

Solution:   The vendor has issued the following fixes:

Windows XP Service Pack 3:

http://www.microsoft.com/downloads/details.aspx?familyid=D7A47370-F415-46EA-9A82-A943F743C8B6

Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=DB89D88F-D0D4-4ED6-8589-BF27557C0304

Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7A26A437-A705-4D48-8389-50F159A39891

Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=95393F89-0B05-4243-95ED-17BCDAD24BFB

Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?familyid=3B094BDB-4150-44F2-A638-AFD5F41B00A3

Windows Vista Service Pack 1 and Windows Vista Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=C1FE1E53-34D5-497E-8BA2-50CAA8DC1158

Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=7BC0A285-CC32-4C6B-ABEE-D92130D459B7

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=B88D0471-4427-4835-9446-DB71116481F0

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=D3DF6184-3E3C-4949-A1EE-293EC68F8149

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?familyid=9E021D69-7F0C-457F-AF86-07E760D8F421

Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=41DB1B2F-F862-43BB-89BC-4B97737E5CB9

Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=211ABDC6-40C7-4BFC-8C2D-BE72981F311E

Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=4F54E498-3825-407D-A036-1900A65D34F1

Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?familyid=E7AE39E8-1154-4A13-8598-29D4A6358762

A restart is required.

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms11-054.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms11-054.mspx (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC