SB2018021332 - Multiple vulnerabilities in Windows kernel
Published: February 13, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-0810)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper initialization of a memory address by the Windows kernel. A remote attacker can run a specially crafted application, gain access to potentially sensitive information and perform further attacks.
2) Information disclosure (CVE-ID: CVE-2018-0829)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory by the Windows kernel. A remote attacker can run a specially crafted application, gain access to potentially sensitive information and perform further attacks.
3) Information disclosure (CVE-ID: CVE-2018-0830)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.The vulnerability exists due to improper handling of memory by the Windows kernel. A remote attacker can run a specially crafted application, gain access to potentially sensitive information and perform further attacks.
4) Privilege escalation (CVE-ID: CVE-2018-0831)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
5) Information disclosure (CVE-ID: CVE-2018-0832)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of a memory address by the Windows kernel. A remote attacker can run a specially crafted application, retrieve the memory address of a kernel object and bypass Kernel Address Space Layout Randomization (ASLR).
6) Information disclosure (CVE-ID: CVE-2018-0843)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper initialization of a memory address by the Windows kernel. A remote attacker can run a specially crafted application, gain access to potentially sensitive information and perform further attacks.
7) Privilege escalation (CVE-ID: CVE-2018-0742)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
8) Privilege escalation (CVE-ID: CVE-2018-0756)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
9) Privilege escalation (CVE-ID: CVE-2018-0809)
The vulnerability allows a remote authenticated attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory by the Windows kernel. A remote attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
10) Privilege escalation (CVE-ID: CVE-2018-0820)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
11) Information disclosure (CVE-ID: CVE-2018-0757)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.The vulnerability exists due to improper initialization of a memory address by the Windows kernel. A remote attacker can run a specially crafted application, gain access to potentially sensitive information and perform further attacks.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0810
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0829
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0830
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0831
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0832
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0843
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0742
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0756
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0809
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0820
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0757