CERT-In Vulnerability Note
CIVN-2015-0277
Multiple vulnerabilities in Microsoft Windows Kernel
Original Issue Date:November 12, 2015
Severity Rating: HIGH
Software Affected
- Windows Vista SP 2
- Windows Vista x64 Edition SP 2
- Windows Server 2008 for 32-bit Systems SP 2
- Windows Server 2008 for x64-based Systems SP 2
- Windows Server 2008 for Itanium-based Systems SP 2
- Windows 7 for 32-bit Systems SP 1
- Windows 7 for x64-based Systems SP 1
- Windows Server 2008 R2 for x64-based Systems SP 1
- Windows Server 2008 R2 for Itanium-based Systems SP 1
- Windows 8 for 32-bit Systems
- Windows 8 for x64-based Systems
- Windows 8.1 for 32-bit Systems
- Windows 8.1 for x64-based Systems
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT
- Windows RT 8.1
- Windows 10 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1511 for 32-bit Systems
- Windows 10 Version 1511 for x64-based Systems
- Windows Server 2008 for 32-bit Systems SP 2 (Server Core installation)
- Windows Server 2008 for x64-based Systems SP 2 (Server Core installation)
- Windows Server 2008 R2 for x64-based Systems SP 1 (Server Core installation)
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2 (Server Core installation)
Overview
Multiple vulnerabilities exist in Microsoft Windows Kernel which could be exploited by an attacker to cause arbitrary code execution, gain elevated privileges, obtain sensitive information or bypass security restrictions on the target system.
Description
1. Kernel Privilege Escalation Vulnerability
(
CVE-2015-6100
CVE-2015-6101
)
These vulnerabilities exist due to improper handling of objects in Microsoft Windows kernel memory. An attacker could exploit these vulnerabilities by executing the specially crafted application on the target system. Successful exploitation of the vulnerability could allow a local attacker to gain elevated privileges and execute arbitrary code in kernel mode, leading to a complete system compromise.
2. Kernel Information Disclosure Vulnerability
(
CVE-2015-6102
CVE-2015-6109
)
These vulnerabilities exist due to improper initialization of memory addresses in Microsoft Windows Kernel memory. A local attacker could exploit these vulnerabilities by executing a specially crafted application on the target system to gain information related to kernel and bypass Kernel Address Space Layout Randomization (KASLR) controls. Successful exploitation of the vulnerability could allow an attacker to obtain base address of the Kernel driver. The attacker could use the information to launch additional attacks.
3. Graphics Memory Remote Code Execution Vulnerability
(
CVE-2015-6103
CVE-2015-6104
)
These vulnerabilities exist due to improper handling of specially crafted embedded fonts by Microsoft Windows Adobe Type Manager Library. A remote attacker could exploit these vulnerabilities by enticing the user to open specially crafted document or to visit untrusted website containing embedded fonts on the target system. Successful exploitation of the vulnerability could allow an attacker to execute arbitrary code with the privileges of the user.
4. Kernel Security Bypass Vulnerability
(
CVE-2015-6113
)
This vulnerability exists in Microsoft Windows Kernel while validating permissions which could be exploited by a local attacker by executing specially crafted applications at low integrity level on the target system. Successful exploitation of the vulnerability could allow the attacker to modify the files outside a low integrity level restrictions.
Solution
Apply appropriate patches as mentioned in the Microsoft Security Bulletin
MS15-115
Vendor Information
Microsoft
https://technet.microsoft.com/library/security/MS15-115
References
Microsoft
https://technet.microsoft.com/library/security/MS15-115
Security Tracker
http://www.securitytracker.com/id/1034114
CVE Name
CVE-2015-6100
CVE-2015-6101
CVE-2015-6102
CVE-2015-6103
CVE-2015-6104
CVE-2015-6109
CVE-2015-6113
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|