SB2016080930 - Security Update for Windows Kernel-Mode Drivers
Published: August 9, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Elevation of privilege (CVE-ID: CVE-2016-3308)
The vulnerability allows a local user to gain elevated privileges on vulnerable system.
The vulnerability exists due to boundary error in Win32k.sys driver when handling objects in memory. A local user can trigger buffer overflow and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability will allow a local user to gain complete access to vulnerable system.
2) Elevation of privilege (CVE-ID: CVE-2016-3309)
The vulnerability allows a local user to gain elevated privileges on vulnerable system.
The vulnerability exists due to boundary error in Win32k.sys driver when handling objects in memory. A local user can trigger buffer overflow and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability will allow a local user to gain complete access to vulnerable system.
3) Elevation of privilege (CVE-ID: CVE-2016-3310)
The vulnerability allows a local user to gain elevated privileges on vulnerable system.
The vulnerability exists due to boundary error in Win32k.sys driver when handling objects in memory. A local user can trigger buffer overflow and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability will allow a local user to gain complete access to vulnerable system.
4) Elevation of privilege (CVE-ID: CVE-2016-3311)
The vulnerability allows a local user to gain elevated privileges on vulnerable system.
The vulnerability exists due to boundary error in Win32k.sys driver when handling objects in memory. A local user can trigger buffer overflow and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability will allow a local user to gain complete access to vulnerable system.
Remediation
Install update from vendor's website.