SB2017031412 - Multiple vulnerabilities in Microsoft Windows
Published: March 14, 2017 Updated: March 14, 2017
Security Bulletin ID
SB2017031412
Severity
Low
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2017-0050)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper enforcing of permissions by Windows Kernel API. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.
Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.
2) Privilege escalation (CVE-ID: CVE-2017-0101)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper handling of objects in memory by Windows Transaction Manager. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.
Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.
3) Privilege escalation (CVE-ID: CVE-2017-0102)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper checking of the length of a buffer when copying memory to it. A local attacker can copy a file to a shared folder or drive, trigger boundary error and gain elevated privileges on the affected system.
Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.
4) Privilege escalation (CVE-ID: CVE-2017-0103)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper handling of registry objects in memory by Windows Kernel API. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.
Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.
Remediation
Install update from vendor's website.