SB2023101050 - Multiple vulnerabilities in Microsoft Win32k



SB2023101050 - Multiple vulnerabilities in Microsoft Win32k

Published: October 10, 2023 Updated: April 19, 2024

Security Bulletin ID SB2023101050
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41772)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Win32k, which leads to security restrictions bypass and privilege escalation.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-36731)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Win32k, which leads to security restrictions bypass and privilege escalation.


3) Race condition (CVE-ID: CVE-2023-36776)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in Win32k. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


4) Race condition (CVE-ID: CVE-2023-36732)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the DEVLOCKBLTOBJ class in the win32kfull driver. A local user can exploit the race and execute arbitrary code with SYSTEM privileges.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-36743)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in Win32k, which leads to security restrictions bypass and privilege escalation.


Remediation

Install update from vendor's website.