Multiple vulnerabilities in Microsoft Windows Kernel

Published: 2018-03-13 22:39:10
Severity Low
Patch available YES
Number of vulnerabilities 14
CVE ID CVE-2018-0904
CVE-2018-0811
CVE-2018-0894
CVE-2018-0895
CVE-2018-0896
CVE-2018-0897
CVE-2018-0898
CVE-2018-0899
CVE-2018-0900
CVE-2018-0901
CVE-2018-0926
CVE-2018-0813
CVE-2018-0814
CVE-2018-0977
CVSSv3 2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-200
CWE-119
Exploitation vector Local
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 7
Windows 10
Windows RT 8.1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2008
Windows Server 2008 R2
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0904

2) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it initializes objects in memory. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and perform further attacks.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0811

3) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0894

4) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0895

5) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0896

6) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0897

7) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0898

8) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0899

9) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0900

10) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it handles memory addresses. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and bypass a Kernel Address Space Layout Randomization (ASLR).

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0901

11) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it initializes objects in memory. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and perform further attacks.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0926

12) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it initializes objects in memory. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and perform further attacks

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0813

13) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to an error in the Windows kernel when it initializes objects in memory. A remote attacker can run a specially crafted application to gain access to potentially sensitive information and perform further attacks

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0814

14) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of objects in memory by the Windows kernel-mode driver. A local attacker can run a specially crafted application, trigger memory corruption and run arbitrary code in kernel mode.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0977

Back to List