Privilege escalation in Microsoft DirectX Graphics Kernel Subsystem

Published: 2018-04-10 23:10:33
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2018-1009
CVSSv3 6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Local
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 10
Windows RT 8.1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of objects in memory and incorrect mapping of kernel memory by the Microsoft DirectX graphics kernel subsystem (dxgkrnl.sys). A local attacker can run a specially crafted application, trigger memory corruption and gain system privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1009

Back to List