Multiple vulnerabilities in Microsoft Windows kernel

Published: 2018-12-11 21:47:55
Severity Low
Patch available YES
Number of vulnerabilities 7
CVE ID CVE-2018-8649
CVE-2018-8641
CVE-2018-8639
CVE-2018-8637
CVE-2018-8622
CVE-2018-8621
CVE-2018-8477
CVSSv3 5.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.3 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-119
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10 1809
Windows 8.1
Windows 7

Show more

Windows Server 2019
Windows Server 2012
Windows Server 2012 R2

Show more

Vendor URL Microsoft

Security Advisory

1) Buffer overflow

Description

The vulnerability allows a local user to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary error n Windows kernel. A local unprivileged user can cause the Windows kernel to crash.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8649

2) Buffer overflow

Description

The vulnerability allows a local user to execute arbitrary code with escalated privileges.

The vulnerability exists due to a boundary error in Windows kernel-mode driver win32k.sys. A local user can use a specially crafted application to execute arbitrary code with SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8641

3) Memory corruption

Description

The vulnerability allows a local user to gain elevated privileges on the target system.

The vulnerability exists due to a boundary error in Windows kernel-mode driver win32k.sys. A local user can use a specially crafted application to execute arbitrary code with SYSTEM privileges.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8639

4) Out-of-bounds read

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition Windows kernel. A local user can run a specially crafted application to read contests from kernel memory and use the information to bypass Kernel Address Space Layout Randomization (KASLR) protection.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8637

5) Out-of-bounds read

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Windows kernel. A local user can read contents of kernel memory.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8622

6) Out-of-bounds read

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Windows kernel. A local user can read contents of kernel memory.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8621

7) Out-of-bounds read

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Windows kernel. A local user can read contents of kernel memory.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8477

Back to List