Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
CSRSS Local EOP AllocConsole Vulnerability
An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
CSRSS Local EOP SrvSetConsoleLocalEUDC Vulnerability
An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights
CSRSS Local EOP SrvSetConsoleNumberOfCommand Vulnerability
An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
CSRSS Local EOP SrvWriteConsoleOutput Vulnerability
An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
CSRSS Local EOP SrvWriteConsoleOutputString Vulnerability
An elevation of privilege vulnerability exists in Windows CSRSS due to the way that the CSRSS subsystem assigns memory for specific user transactions. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact
- Elevation of Privilege
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://www.microsoft.com/technet/security/bulletin/ms11-056.mspx
Vulnerability Identifier
Source
Related Link
Share with