CERT-In Vulnerability Note
CIVN-2010-0261
Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerability
Original Issue Date:December 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Windows XP Service Pack 3
- Microsoft Windows XP Professional x64 Edition Service Pack 2
- Microsoft Windows Server 2003 Service Pack 2
- Microsoft Windows Server 2003 x64 Edition Service Pack 2
- Microsoft Windows Server 2003 SP2 (Itanium)
- Microsoft Windows Vista Service Pack 1
- Microsoft Windows Vista Service Pack 2
- Microsoft Windows Vista x64 Edition Service Pack 1
- Microsoft Windows Vista x64 Edition Service Pack 2
- Microsoft Windows Server 2008 (32-bit)
- Microsoft Windows Server 2008 (32-bit) Service Pack 2
- Microsoft Windows Server 2008 (x64)
- Microsoft Windows Server 2008 (x64) Service Pack 2
- Microsoft Windows Server 2008 (Itanium)
- Microsoft Windows Server 2008 (Itanium) Service Pack 2
- Microsoft Windows 7 (32-bit)
- Microsoft Windows 7 (x64)
- Microsoft Windows Server 2008 R2 (x64)
- Microsoft Windows Server 2008 R2 (Itanium)
Overview
Multiple vulnerabilities have been reported in Microsoft Windows, Successful exploitation of these vulnerability could allow local attackers to gain elevated privileges.
Description
The Windows kernel is the core of the operating system. It provides system-level services such as device management and memory management, allocates processor time to processes, and manages error handling.
Win32k.sys is a kernel-mode device driver and is the kernel part of the Windows subsystem. It contains the window manager, passes user messages to applications, graphics device interface (GDI), which is a library of functions for graphics output devices and also serves as a wrapper for DirectX support that is implemented in another driver (dxgkrnl.sys).
Win32k Buffer Overflow Vulnerability
(
CVE-2010-3939
)
A memory allocation error vulnerability is reported in Microsoft Windows "win32k.sys" kernel-mode drivers due to improper allocation of memory when copying data from user mode.
Win32k PFE Pointer Double Free Vulnerability
(
CVE-2010-3940
)
A double free condition is a condition in which a program is caused to release or free allocated memory more than once. Releasing memory that has already been freed could lead to memory corruption. A double-free error vulnerability is reported in Microsoft Windows "win32k.sys" driver when handling PFE objects. This vulnerability is caused by a "double free" condition involving a pointer to a kernel-mode drivers free objects that are no longer in use.
Win32k Double Free Vulnerability
(
CVE-2010-3941
)
A double-free error vulnerability is reported in Microsoft Windows "win32k.sys" driver when running 16-bit programs. This vulnerability is caused by a "double free" condition involving a pointer to a kernel-mode drivers free objects that are no longer in use
Win32k WriteAV Vulnerability
(
CVE-2010-3942
)
A memory allocation error vulnerability is reported in Microsoft Windows "win32k.sys" kernel-mode drivers due to improper allocation of memory when copying data from user mode.
Win32k Cursor Linking Vulnerability
(
CVE-2010-3943
)
A logical error vulnerability is reported in Microsoft Windows"win32k.sys" Kernel-mode drivers. The vulnerability is caused by a logic error that occurs when linking kernel-mode driver objects, leading to a corrupted linked list.
Win32k Memory Corruption Vulnerability
(
CVE-2010-3944
)
An input validation vulnerability is reported in Microsoft Windows "win32k.sys" kernel-mode drivers due to improper validate input passed from user mode. Successful exploitation of these vulnerabilities could allow remote attacker to run arbitrary code in kernel mode and can take complete control of the affected system in the context of logged in user.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS10-098
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-098.mspx
http://support.microsoft.com/kb/294871
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-098.mspx
http://support.microsoft.com/kb/294871
AUS-CERT
http://www.auscert.org.au/render.html?it=13725
Secunia
http://secunia.com/advisories/42612
SecurityTracker
http://securitytracker.com/alerts/2010/Dec/1024880.html
Vupen
http://www.vupen.com/english/advisories/2010/3220
CVE Name
CVE-2010-3939
CVE-2010-3940
CVE-2010-3941
CVE-2010-3942
CVE-2010-3943
CVE-2010-3944
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|