CERT-In Vulnerability Note
CIVN-2015-0279
Microsoft Windows NDIS local privilege escalation Vulnerability
Original Issue Date:November 12, 2015
Severity Rating: MEDIUM
Software Affected
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems Service Pack 2
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Overview
A Vulnerability has been reported in Microsoft Windows NDIS which could be exploited by malicious, local user to gain escalated privileges.
Description
The vulnerability occurs due to improper validation of buffer length in Microsoft windows NDIS (Network Driver Interface Standard) before copying memory in buffer.
A local attacker could exploit this vulnerability by running a specially crafted application to trigger buffer copying error resulting in gaining elevated privileges on the target system.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS15-117
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/MS15-117
References
Microsoft
https://technet.microsoft.com/en-us/library/security/MS15-117
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=41861
Security Tracker
http://www.securitytracker.com/id/1034115
Symantec
http://www.symantec.com/security_response/vulnerability.jsp?bid=77473
CVE Name
CVE-2015-6098
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|