SB2018041022 - Multiple vulnerabilities in Windows kernel
Published: April 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-0975)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
2) Information disclosure (CVE-ID: CVE-2018-0974)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
3) Information disclosure (CVE-ID: CVE-2018-0973)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
4) Information disclosure (CVE-ID: CVE-2018-0972)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
5) Information disclosure (CVE-ID: CVE-2018-0971)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
6) Information disclosure (CVE-ID: CVE-2018-0970)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
7) Information disclosure (CVE-ID: CVE-2018-0969)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
8) Information disclosure (CVE-ID: CVE-2018-0968)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application, bypass Kernel Address Space Layout Randomization and retrieve the memory address of a kernel object.
9) Information disclosure (CVE-ID: CVE-2018-0960)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application and retrieve the memory address of a kernel object.
10) Information disclosure (CVE-ID: CVE-2018-0887)
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to improper initialization of memory by the Windows kernel. A local attacker can run a specially crafted application and retrieve the memory address of a kernel object.
11) Privilege escalation (CVE-ID: CVE-2018-0963)
The vulnerability allows a local attacker to gain elevated privileges.
The vulnerability exists due to improper handling of memory addresses by the Windows kernel. A local attacker can run a specially crafted application and execute arbitrary code with system privileges.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0975
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0974
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0973
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0972
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0971
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0970
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0969
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0968
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0960
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0887
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0963