CERT-In Vulnerability Note
CIVN-2016-0317
Multiple Elevation of Privilege Vulnerabilities in Microsoft Windows Kernel Mode Drivers
Original Issue Date:December 14, 2016
Severity Rating: MEDIUM
Software Affected
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems and x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems Service Pack 2
- Windows 7 for 32-bit Systems and x64-based Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
- Windows 8.1 for 32-bit Systems and x64-based Systems.
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT 8.1
- Microsoft Windows 10 for 32-bit Systems and x64-based Systems
- Microsoft Windows 10 version 1511 for 32-bit Systems and x64-based Systems
- Microsoft Windows 10 version 1607 for 32-bit Systems and x64-based Systems
- Windows Server 2016 for x64-based Systems
- Windows Server 2008 for 32-bit Systems and x64-based Systems Service Pack 2
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2 (Server Core installation)
Overview
Multiple Vulnerabilities have been reported in Microsoft Windows Kernel Mode Drivers which could allow an attacker to gain elevated privileges on the targeted system.
Description
1. Win32k Elevation of Privilege Vulnerability
(
CVE-2016-7259
)
An elevation of privilege vulnerability exists in Microsoft Windows Kernel Mode Driver due to improper handling of objects in memory by the Windows Graphics Component. An attacker could exploit this vulnerability by running a specially crafted application on the targeted system. Successful exploitation of this vulnerability could allow an attacker to gain elevated privileges and take complete control of the affected system.
2. Win32k Elevation of Privilege Vulnerability
(
CVE-2016-7260
)
An elevation of privilege vulnerability exists in Microsoft Windows Kernel Mode Driver due to improper handling of objects in memory. An attacker could exploit this vulnerability by running a specially crafted application on the targeted system. Successful exploitation of this vulnerability could allow an attacker to run arbitrary code in kernel mode and then install programs; modify data; or create new accounts with full user rights.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS16-151
Vendor Information
Microsoft
https://technet.microsoft.com/library/security/ms16-151
References
Cisco
https://tools.cisco.com/security/center/viewAlert.x?alertId=49973
https://tools.cisco.com/security/center/viewAlert.x?alertId=49974
CVE Name
CVE-2016-7259
CVE-2016-7260
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|