Memory corruption in Win32k.sys driver in Windows Server and Windows - CVE-2016-3250

 

Memory corruption in Win32k.sys driver in Windows Server and Windows - CVE-2016-3250

Published: July 13, 2016 / Updated: February 3, 2017


Vulnerability identifier: #VU125
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-3250
CWE-ID: CWE-90
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Microsoft
Affected software:
Windows Server
Windows

Detailed vulnerability description

The vulnerability allows a local user to obtain elevated privileges.

The vulnerability exists doe to an error in Win32k.sys kernel-mode driver when handling certain objects in memory. A local user can elevate privileges on vulnerable system.

Successful exploitation of this vulnerability will allow a local attacker to executed arbitrary code with SYSTEM privileges.


How to mitigate CVE-2016-3250

To resolve this vulnerability vendor recommends installing the following updates:

Windows Server 2012

Windows Server 2012

Windows RT 8.1

Use Windows Update to obtain patch.

Windows 10

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for x64-based Systems

Server Core installation option

Windows Server 2012


Sources