Multiple vulnerabilities in Microsoft Windows Kernel

Published: 2018-06-12 21:25:53
Severity Low
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2018-8224
CVE-2018-8207
CVE-2018-8121
CVSSv3 7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-119
CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows Server
Windows
Vulnerable software versions Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows 7
Windows 8.1
Windows 10
Windows RT 8.1
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code in kernel mode.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8224

2) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to improper handling of objects in memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and gain access to potentially sensitive information.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8207

3) Information disclosure

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to improper initializing of objects in memory by the Windows kernel. A local attacker can run a specially crafted application, trigger memory corruption and gain access to potentially sensitive information.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8121

Back to List