Multiple vulnerabilities in Microsoft Windows kernel

Published: 2018-01-04 09:54:32
Severity Low
Patch available YES
Number of vulnerabilities 7
CVE ID CVE-2018-0746
CVE-2018-0747
CVE-2018-0748
CVE-2018-0751
CVE-2018-0752
CVE-2018-0744
CVE-2018-0745
CVSSv3 3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-200
CWE-264
CWE-119
Exploitation vector Network
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 10
Windows 7
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2008
Windows Server 2008 R2
Vendor URL Microsoft

Security Advisory

1) Information disclosure

Description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0746

2) Information disclosure

Description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0747

3) Privilege escalation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Kernel API enforces permissions. A local user can use a specially crafted application to impersonate processes, interject cross-process communication, or interrupt system functionality.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0748

4) Privilege escalation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Kernel API enforces permissions. A local user can use a specially crafted application to impersonate processes, interject cross-process communication, or interrupt system functionality.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0751

5) Privilege escalation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Kernel API enforces permissions. A local user can use a specially crafted application to impersonate processes, interject cross-process communication, or interrupt system functionality.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0752

6) Memory corruption

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Windows kernel. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system with SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0744

7) Information disclosure

Description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0745

Back to List