SB2020060958 - Multiple privilege escalation vulnerabilities in Windows kernel
Published: June 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2020-1273)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
2) Buffer overflow (CVE-ID: CVE-2020-1316)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
3) Input validation error (CVE-ID: CVE-2020-1241)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input in Windows kernel. A local user can run a specially crafted application and bypass implemented security features.
4) Buffer overflow (CVE-ID: CVE-2020-1324)
The vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to a boundary error in Windows Security Health Service. A local user can run a specially crafted command, trigger memory corruption and gain elevated privileges on the target system.
5) Buffer overflow (CVE-ID: CVE-2020-1307)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
6) Buffer overflow (CVE-ID: CVE-2020-1275)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
7) Buffer overflow (CVE-ID: CVE-2020-1274)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
8) Buffer overflow (CVE-ID: CVE-2020-1269)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
9) Buffer overflow (CVE-ID: CVE-2020-1262)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
10) Buffer overflow (CVE-ID: CVE-2020-1246)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
11) Buffer overflow (CVE-ID: CVE-2020-1237)
The vulnerability allows a local user to escalate privilege so the system.
The vulnerability exists due to a boundary error in the Windows Kernel when handling objects in memory. A local user can create a specially crafted application, trigger memory corruption and execute arbitrary code on the target system with elevated privileges.
12) Buffer overflow (CVE-ID: CVE-2020-1276)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
13) Buffer overflow (CVE-ID: CVE-2020-1266)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
14) Buffer overflow (CVE-ID: CVE-2020-1264)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing objects in memory within the Windows kernel. A local user can create a malicious application, launch it on the system and execute arbitrary code with SYSTEM privileges.
15) Buffer overflow (CVE-ID: CVE-2020-1162)
The vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to a boundary error in Windows Security Health Service. A local user can run a specially crafted command, trigger memory corruption and gain elevated privileges on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1273
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1316
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1241
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1324
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1307
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1275
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1274
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1269
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1262
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1246
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1237
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1276
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1266
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1264
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1162