Privilege escalation in Microsoft Windows DirectX Graphics Kernel (DXGKRNL) driver

Published: 2018-08-14 22:30:54
Severity Low
Patch available YES
Number of vulnerabilities 4
CVE ID CVE-2018-8400
CVE-2018-8401
CVE-2018-8405
CVE-2018-8406
CVSSv3 6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10
Windows 8.1
Windows RT 8.1
Windows Server 2016
Windows Server 2012 R2
Vendor URL Microsoft

Security Advisory

1) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the DirectX Graphics Kernel (DXGKRNL) driver. A local attacker can run a specially crafted application, trigger memory corruption and gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8400

2) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the DirectX Graphics Kernel (DXGKRNL) driver. A local attacker can run a specially crafted application, trigger memory corruption and gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8401

3) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the DirectX Graphics Kernel (DXGKRNL) driver. A local attacker can run a specially crafted application, trigger memory corruption and gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8405

4) Memory corruption

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the DirectX Graphics Kernel (DXGKRNL) driver. A local attacker can run a specially crafted application, trigger memory corruption and gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8406

Back to List