Skip to main content

Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities

Last Update Date: 13 May 2015 14:37 Release Date: 13 May 2015 3827 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. Multiple Microsoft Windows Kernel Memory Disclosure Vulnerabilities
    Information disclosure vulnerabilities exist when the Windows kernel-mode driver leaks private address information during a function call, which could allow the disclosure of kernel memory contents revealing information about the system to an attacker. The information disclosure vulnerabilities by themselves do not allow arbitrary code execution. However, an attacker could use them in conjunction with another vulnerability to bypass security features, such as Address Space Layout Randomization (ASLR). The security update addresses the vulnerabilities by correcting how the kernel-mode driver handles objects in memory.
  2. Win32k Elevation of Privilege Vulnerability
    An elevation of privilege vulnerability exists when the Win32k.sys kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.

Impact

  • Elevation of Privilege
  • Information Disclosure

System / Technologies affected

  • Microsoft Windows Server 2003
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
  • Microsoft Windows 7
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows 8 and Windows 8.1
  • Microsoft Windows RT and Windows RT 8.1
  • Microsoft Windows Server 2012 and Windows Server 2012 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link