Privilege escalation in Microsoft Windows NDIS



Published: 2018-08-14
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2018-8342
CVE-2018-8343
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Windows Server
Operating systems & Components / Operating system

Windows
Operating systems & Components / Operating system

Vendor Microsoft

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Privilege escalation

EUVDB-ID: #VU14401

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-8342

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows Server: 2008 R2 - 2008 R2

Windows: 7 - 7

CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8342


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Privilege escalation

EUVDB-ID: #VU14402

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-8343

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: 7 - 10

Windows Server: 2008 R2 - 2016

CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8343


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###