SB2017101013 - Information disclosure in Microsoft Windows Kernel
Published: October 10, 2017
Security Bulletin ID
SB2017101013
Severity
Low
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Local access
Highest impact
Information disclosure
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2017-11765)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application and gain access to arbitrary data.
Successful exploitation of the vulnerability may result in further attack.
2) Information disclosure (CVE-ID: CVE-2017-11814)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application and gain access to arbitrary data.
Successful exploitation of the vulnerability may result in further attack.
3) Information disclosure (CVE-ID: CVE-2017-11785)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The vulnerability exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application, retrieve the memory address of a kernel object and bypass Kernel Address Space Layout Randomization (ASLR).
Successful exploitation of the vulnerability may result in further attack.
4) Information disclosure (CVE-ID: CVE-2017-11784)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The vulnerability exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application, retrieve the memory address of a kernel object and bypass Kernel Address Space Layout Randomization (ASLR).
Successful exploitation of the vulnerability may result in further attack.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11765
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11814
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11785
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11784