Privilege escalation in Microsoft Windows NDIS

Published: 2018-08-14 23:10:46
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-8342
CVE-2018-8343
CVSSv3 6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows Server
Windows
Vulnerable software versions Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows 7
Windows 8.1
Windows 10
Windows RT 8.1
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8342

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8343

Back to List