Severity | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE ID | CVE-2018-8342 CVE-2018-8343 |
CVSSv3 |
6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] 6.8 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] |
CWE ID |
CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Windows Server Windows |
Vulnerable software versions |
Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows 7 Windows 8.1 Windows 10 Windows RT 8.1 |
Vendor URL | Microsoft |
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.
RemediationInstall updates from vendor's website.
External linkshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8342
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists in the Network Driver Interface Specification (NDIS) due to ndis.sys fails to check the length of a buffer prior to copying memory to it. A local attacker can run a specially crafted application and trigger memory corruption to gain SYSTEM privileges.
RemediationInstall updates from vendor's website.
External linkshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8343