CERT-In Vulnerability Note
CIVN-2016-0316
Microsoft Windows Secure Kernel Mode Privilege Escalation Vulnerability
Original Issue Date:December 14, 2016
Severity Rating: HIGH
Software Affected
- Windows 10 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1511 for 32-bit Systems
- Windows 10 Version 1511 for x64-based System
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows Server 2016 for x64-based Systems
- Windows Server 2016 for x64-based Systems (Server Core installation)
Overview
A vulnerability has been reported in Microsoft Windows secure kernel mode which could be exploited by a authenticated local attacker to gain elevated privileges and violate virtual trust levels (VTL) on the target system.
Description
The Privilege Escalation vulnerability exist in Microsoft windows Secure Kernel Mode due to improper handling of memory resources. A local attacker with login access to system could exploit this vulnerability by executing a specially crafted application on the affected system.
Successful exploitation of this vulnerability could allow a local attacker to gain elevated privileges and violate virtual trust levels (VTL) which could be used to launch further attacks on the targeted system.
Solution
Apply appropriate patch as mentioned in Microsoft Security Bulletin
MS16-150
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms16-150.aspx
References
Microsoft
https://technet.microsoft.com/en-us/library/security/ms16-150.aspx
CISCO
https://tools.cisco.com/security/center/viewAlert.x?alertId=44453
CVE Name
CVE-2016-7271
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|